Fully Managed Dedicated Server Hosting – DreamHost #fully #managed #dedicated #server


#

Fully-Managed Dedicated Server Hosting

When you’re done sharing and want your own server.

A dedicated server gives you the ultimate in control, power and security. With your own server, there’ll be no more noisy neighbors disrupting your website performance. You’ll have access to all the server resources and horsepower you need for your website. Plus, with our dedicated server experts managing and monitoring the performance of your server 24×7, you can focus on your business.

Dedicated Server Hosting is Perfect For.

High Traffic Websites

Victim of your own success? When your high-traffic site outgrows traditional shared hosting, upgrading to the power of a dedicated server will keep your site performing at peak levels.

Large ecommerce websites

If you’re running a business online, you can’t afford downtime. With a dedicated server your online storefront has room to scale and withstand high traffic during the busiest times.

Agencies with High Profile Clients

Actors, musical artists, tech luminaries – they all need web hosting, and a dedicated server is the perfect place to house their live streaming needs as well as the millions of fans visiting their sites.

Reseller Hosting

Make extra money by providing hosting for the sites that you build for others. Where shared hosting falls short, a dedicated server is powerful enough to bring you additional revenue.

Data Center Alley

Check out our newest state-of-the-art facility in Ashburn, Virginia that we call “Data Center Alley”. It includes 2N+2 power redundancy fed by two distinct utility substations and dual water lines for redundant cooling. There’s a fast 1GBps internet connection and emergency generators on standby for technical security and multifactor identification, multi-level security zones and 24×7 staffing for even more peace of mind.

Size does matter

Go ahead compare yourself to the other guys! Dedicated servers from DreamHost are big enough to handle any need. With plenty of room to grow, you won’t have to worry about RAM, disk space or bandwidth ever again.

Custom Built Control Panel

Over the past 15+ years we’ve enhanced our control panel to provide the power and control that dedicated hosting customers like you demand. Add or remove servers, reboot or powercycle your server whenever it’s needed and have complete management over all the domains, websites and email addresses you own.

Starting at $149/mo

We have lots of options to help you get the dedicated server you need. Try out our configurator below for an instant quote.


04/11/2017

Posted In: NEWS

Tags: , , ,

Leave a Comment

SQL Server 2005: How To Restore a Database from a Backup


#

SQL Server 2005: How To Restore a Database from a Backup

Posted February 7, 2007 by Rob Rogers in Database

Your database is down, your users are in a panic, what do you do. If you have been performing routine backups of your database, you can restore it to the point of the most recent backup. To restore your database, follow these steps:

1. Open SQL Server 2005 Management Studio.

2. Connect to the appropriate server.

4. Right-click the desired database, mouseover Tasks. mouseover Restore and select Database .

5. The Restore Database window will appear.

6. Ensure that the correct database name appears in the To database field. If not, select it from the dropdown.

7. Under Source for restore. select the From device radio button.

8. Click the button next to the textbox to select the device to restore from.

9. The Specify Backup window will appear.

10. Click Add and locate and select the backup file from the Locate Backup File Window. Click OK.

11. Under Select the backup sets to restore. select all three backups (full, transaction log, and differential).

12. In the left pane, select Options .

13. Under Recovery state. ensure that the Restore with Recovery radio button is selected.

14. Click OK to begin restoring the database.

15. Once the restore is complete, a notification box will appear. Click OK to close the box. You have now restored your database to the most recent state.

I taken backup of database from Sql server 2005 from other PC and try to Restore it on my PC. Both having Windows authentication. But i am facing following error

System.Data.Sqlclient.sqlError:The media set has 2 media families but only 1 are provided.All member must be provided.(Microsoft.Sqlserver.Smo).

IS it problem of Ownar. because owanr of .bak file is different from where i try to restore it.

Hi,
This is not the problem of owner, it is just because while selecting the restoring device there must be two paths (1. Default by Microsoft, 2. Given by you).
So delete the default path given by SQL Server itself, so it remains only one path that is given by you.
Do let me know in case this doesn t work also
Regards,
Himanshu

i have stored mdf file and ldf file in dotnet solution file. i have copied my project from another system. i have to restore the database inorder to run my dotnet project.
i have followed your procedure, but when i click the ok button, it shows error.

please help me .

How To attach database sql

mdf and ldf files are not sql2005 based. its sql 2000. so install that and not need to restore. you right click the database in enterprise manager in sql2000..attach the MDF file from location. then run the program

Great step by step guidance. Worked a treat for me who is a complete novice

i need to restore my database in sql server 2005 and as i follow the procedure above there still an error. it shows this:

system.data.sqlclient.sqlerror:directory lookup the file C:program filesmicrosoft sql serverMSSQLDATASTUDENTS INFOREMATION.MDF failed with the operating system error 3(the system cannot findthe path specified.).(microsoft.sqlserver.express.smo)

im using windows 7 and visual studio 2008

while restoring my bakup file in MS SQL 2005 it gives

System.Data.SqlClient.SqlError: Directory lookup for the file c:Program FilesMicrosoft SQL ServerMSSQL.1MSSQLDATAtest_infoguideDatabase.mdf failed with the operating system error 3(The system cannot find the path specified.). (Microsoft.SqlServer.Smo)

Me too findind this error while restoration what does it means plz suggest any suitable way to remove this

hi
i restore my database in sqlserver after restore default it display some path(D:\OTHERS\PROJECTS\TENDERMANAGEMENTSYSTEM\APP_DATA\TMSDATABASE.MDF) but i store my db in some other location..

plz help me how to clear this error

sql server by default provides some path u can restore ur db in ur own location jst click on that path and specify ur own path.


17/10/2017

Posted In: NEWS

Tags: , , , ,

Leave a Comment

Sozo Hosting Managed Windows Cloud Server and Cloud Server Hosting Solutions


#

Windows Cloud Server Hosting

Sozo Hosting provides enterprise Managed Windows Cloud Server Hosting solutions. Sozo provides fixed cost cloud servers. No surprises on your bill, No high costs associated with bandwidth memory or CPU usage. The Virtual environment is configured with multiple redundant hosts, redundant networks and a redundant storage area network. Each windows cloud server is proactively monitored for optimal performance, network response time and overall system health. Backups, security updates and Intrusion prevention is also included with managed windows cloud servers. See below for more of the services that are included with managed windows cloud servers.

Testimonial From initial setup of our servers, to their maintenance, resolution of issues as they come up, I can t say enough good about Sozo. Far and away the best hosting experience we have had anywhere!

Incentive Team

Is there a setup fee?

There is a $50 setup fee for a Windows Cloud Server.

What operating system and applications are installed with your Windows Cloud Servers?

We will build your system with 2008R2 or 2012R2. You are free to install other applications and customize your Windows cloud server as you see fit.

What kind of Server Hardware do you run the Cloud systems on?

We use Dell Power Edge servers with XEON virtual technology processors.

Do you backup the Windows Cloud Server?

Yes all the Windows Cloud Servers are regularly backed upon request for free up to 130 GB of disk space. Windows Cloud Server backup costs are $15/month/100 GB increment above 130 GB. See more details about our backup services

Do your plans offer a custom DNS and email control panel?

Yes we offer both.

How many IP Addresses do you offer with your the Windows Cloud Server?

Each Windows Cloud Server comes with 2 dedicated IP addresses.

What does it cost for additional bandwidth?

$75/month for an additional 500GB per month, although most clients will not need this unless they have very high bandwidth requirements.

Is a Windows Cloud Server the same as a Windows Virtual Server?

Yes! Windows Cloud Server is just another name for a Windows Virtual Server

Do You Offer Upgrades To Existing Windows The Cloud Server Configurations?

Yes we have 2 upgrade options: OPTION 1) SATA2 Disk – 1 vcpu s-Xeon 3.16ghz, 20gig SATA2 HD, 500mb burst of RAM for an additional $40/month and OPTION 2) SAS (high Speed) Disk – 1 vcpu s-Xeon 3.16ghz, 30gig SAS HD, 500mb burst of RAM for an additional $50/month.

Do you offer dedicated servers?

Managed Windows Cloud Server Includes:

  • Control Panel for email and DNS Servers
  • High Availability Infrastructure
  • Enterprise Storage Area Network
  • Backups
  • Security updates
  • Intrusion Prevention Security
  • 24/7 Knowledgeable Support
  • Secured by Enterprise Firewalls
  • Spam filtering

16/10/2017

Posted In: NEWS

Tags: , , , , , , , , ,

Leave a Comment

10Gbps iSCSI network transferring at only 2Gbps – Server Fault #dedicated


#

I have a performance issue with my SAN. I have a full 10Gbps private network setup. I have the following setup

1 – Mac with Connected with via Fiber Transciever 10GbE
1 – Windows 7 PC with 10GbE
1 – HP Switch with All ports are 10GbE
2 – Quantum StorNext Servers with 10GbE
1 – Dell Compellent Solution with 2 Controllers connected to the network at 10GbE
All servers, switches, and computers have staticly assigned IPs

Compellent Config
Tier 1 – 10K SAS Drives in RAID 10
Tier 2 – 7200 SAS Drives in RAID6 (12 groups of 13 Drives in Each)

Additional info
Windows 7 Client TCP Offload Options
IPv4 Checksum Offload – Enabled
TCP Checksum Offload – Enabled
UDP Checksum Offload – Enabled
Large Send Offload – Enable
Jumbo Packet – 9014Bytes Enabled

I mounted the StorNext volume on my Windows 7 PC and my Lion Workstation. Unfortunately all my transfer speeds are at around 2Gbps or 2.8Gbps (if I’m really lucky). I was looking to get at least 5Gbps speeds out of this setup, but I’m averaging about 2Gbps or a little above 250MBps transfer rates on file copying. When I map a LUN directly to the boxes and then format it natively with either HFS (with journaling) on the MAC or NTFS on the Windows 7 PC, and then copy a file, I get about 180MBps. So my performance on a directly mapped LUN is slower than my StorNext Volume. Any suggestions? Has anyone seen degraded performance on iSCSI with 10GbE? Any help would be Awesome! Thanks!

asked Jul 23 ’12 at 23:02

1.) Jumbos -might- help if you’re seeing a lot of processor load for interrupt traffic but if TCP is operating correctly it should be able to ramp well past 2G on a 10G link. I’ve seen plenty of 10GE links running above 90% without jumbos enabled.

2.) If you do use jumbos, enable the same size on every NIC and every switchport in the VLAN and/or broadcast domain. PMTU works when packets cross routers and mixing MTU values within the same network will lead to nothing but misery.

3.) I’m not particularly familiar with the Procurve gear but TCP traffic can be tricky at high speeds if there are any questions about buffer availability. I’ve seen other testing where this has manifested (without apparent TCP drops) as a huge cut in performance that ended up being fixed by actually reducing buffer sizes.

4.) Make sure that the actual TCP settings (1323, SACK, etc) are all configured consistently. The operating systems in question should be fine out of the box but I don’t know much about the storage node. It might be worth digging into – either in terms of settings on the device or via a protocol trace (wireshark or tcpdump) to observe window sizing and any retransmissions going on.

5.) Try eliminating as many variables as you can – even getting down to a crossover cable between one of your storage nodes and a single workstation – to further isolate the issue. Don’t be afraid to disable some of the offloads you mentioned as well, as they’ve been known to cause issues from time to time.

answered Jul 24 ’12 at 1:23


16/10/2017

Posted In: NEWS

Tags: , ,

Leave a Comment

Oracle VM Downloads #server #in #the #cloud


#

Oracle VM Server for x86 and Oracle VM Manager

Oracle VM Server for x86 and Oracle VM Manager are available for download from Oracle Software Delivery Cloud or Oracle Technology Network.

  • Download Oracle VM Server for x86 and Oracle VM Manager from Oracle Software Delivery Cloud
  • Download the latest Oracle VM 3.4 release from Oracle Technology Network
  • Download Oracle VM Tools (such as automated virtual machine migration from VMware to Oracle VM, site preparation and deployment tools for disaster recovery solution, etc.) from Oracle Technology Network

Customers with an Oracle support plan covering Oracle VM may download the latest releases, including the latest software ISO releases, drivers, tools or utilities, from My Oracle Support or Unbreakable Linux Network (ULN).

  • Download the latest Oracle VM 3.4 release from My Oracle Support
    • Oracle VM Server ISO, search patch ID 22902487
    • Oracle VM Manager Install/Upgrade ISO, search patch ID 22902502
    • Oracle VM Agent for SPARC, search patch ID 22902518
  • Download Oracle VM Server Update from Oracle Unbreakable Linux Network
  • Download Oracle VM Server disk resizing utility from My Oracle Support. search patch ID 23189880
  • Download Windows PV Drivers 3.4.2 from My Oracle Support. search patch id 23346086; For Windows PV Drivers 3.2.3, search patch ID 16863114
  • Download Oracle VM 3 Utilities (provided as-is and not formally supported except for ovm_vmhostd for SAP customers) from My Oracle Support. patch ID 13602094, please review README for instructions.

For additional resources, you may visit:

Oracle VM Server for SPARC

The following key components work together to deliver the Oracle VM Server for SPARC solution.

  • Supported SPARC servers with required system firmware.
  • Oracle Solaris 10 OS or Oracle Solaris 11 OS
  • Logical Domains Manager that is used to create and manage logical domains on supported SPARC servers.

Please refer to Oracle VM Server for SPARC Release Notes for specific details of required and minimum software and supported platforms.

  • Download Oracle Solaris 11 or Oracle Solaris 10. and pre-built Oracle VM Templates
  • Download Sun System Firmware
  • Download the latest Oracle VM Server for SPARC software from My Oracle Support :
    • 3.4.0.3 release has been integrated into Solaris 11.3.17.5.0. Refer to Oracle Solaris 11.3 Support Repository Updates (SRU) Index [ID 2045311.1 ].
    • To work with OpenStack, download the Nova driver and utility, search patch ID 24654094
    • To work with Oracle VM Manager, download Oracle VM Agent for SPARC, search patch ID 22902518
    • Oracle VM Template Utilities are command line tools to create, deploy and configure Oracle VM Templates for SPARC systems. To download the tools, search patch ID 21210110.
  • Download the previous releases from My Oracle Support :
    • 3.3.0.1 release has been integrated into Solaris 11.3.4.5.0. Refer to Oracle Solaris 11.3 Support Repository Updates (SRU) Index [ID 2045311.1 ].
    • 3.2.0.1 release has been integrated into Solaris 11.2.11.5.0. Refer to Oracle Solaris 11.2 Support Repository Updates (SRU) Index [ID 1672221.1 ].
    • 3.1.1.2 has has been integrated into Oracle Solaris 11.2.5.5.0. Refer to Oracle Solaris 11.2 Support Repository Updates (SRU) Index [ID 1672221.1 ]
    • 3.1.1 release has been integrated into Oracle Solaris 11.1.17.5.0, which replaces 3.1.0.1 (Solaris 11.1.14.5.0) and 3.1 (Solaris 11.1.10.5.0). Refer to Oracle Solaris 11.1 Support Repository Updates (SRU) Index [ID 1501435.1 ].
    • 3.2 release is also available on Oracle Solaris 10, search patch ID 20997186. The 3.2.0.1 patch is 151934-01.
    • 3.1 release is also available on Oracle Solaris 10, search patch ID 17291713. The 3.1.1.2 patch is 150817-04.
    • Oracle VM Server for SPARC 3.0 software has been integrated into Oracle Solaris 11.1 SRU, refer to Oracle Solaris 11.1 Support Repository Updates (SRU) Index [ID 1501435.1 ]. For Solaris 10, search patch ID 15682381, and apply the latest ldmd patch 150011-03 .

My Oracle Support Download Instructions
Visit My Oracle Support – under the tab Patches Updates, choose LDOMS in the field Product or Family (Advanced Search) or search the patch number.

Visit Oracle Technology Network Patching Center to obtain required system firmware patches, Solaris OS patches, and any Oracle VM Server for SPARC software patches.

Oracle Private Cloud Appliance

  • Download Oracle Private Cloud Appliance Software Release 2.2.2 from My Oracle Support. search patch ID 24849670.
  • Download Oracle Private Cloud Appliance Software Release 2.2.1 from My Oracle Support. search patch ID 23564248.
  • Download Oracle Private Cloud Appliance Software Release 2.1.1 from My Oracle Support. search patch ID 22185511.
  • Download Oracle Private Cloud Appliance Software Release 2.0.5 from My Oracle Support. search patch ID 21288160.

15/10/2017

Posted In: NEWS

Tags: , , ,

Leave a Comment

Ohio Rack, Inc #selling #server #space


#

Our Racks Expand the Walls and Raise the Roof

How Stacking Racks Work

Portable stacking racks are self-contained units.They consist of a base and removable posts or endframes. These may be entirely removable or attached with hinges or other folding or collapsing mechanisms.

  • Our Racks Expand the Walls and Raise the Roof

    How Stacking Racks Work

    All of our racks are welded together from American made steel tubing. Just insert the post or frames into the base sockets and move with forklift or pallet jack.

  • Our Racks Expand the Walls and Raise the Roof

    How Stacking Racks Work

    The total stack height should be no greater than 5 times the smallest footprint dimension (five times the depth or width, whichever is smaller).

  • Our Racks Expand the Walls and Raise the Roof

    How Stacking Racks Work

    Different post heights allow storage of different sized products in the same stack utilizing the same bases.

  • Our Racks Expand the Walls and Raise the Roof

    How Stacking Racks Work

    Storage of unused stacking racks is simple. The posts or end frames may be removed and placed on the bases and the bases may then be stacked together for economy of space.

  • New Portable Stack Racks

    Save room by pushing your seasonal and slow moving items tight together. Portable racks are effectively steel pallets with steel posts that stack on top of each other, so you can push them together, end-to-end, saving up to 60% of your storage space.

    New Tire Racks

    Ohio Rack has been selling New Stackable Tire Racks for nearly 30 years. We also manufacture quite a wide variety of New Tire Racks in either All Steel 4 Removable Post, 4 Removable Post Nesters, Fold-Downs or Pallet Frame Styles.

    Used Portable Stack Racks

    We purchase old racks with wooden bases as well as pallet racks and all other types of warehouse equipment. We will also travel to inspect your project for new rack purchases or disposing of your used racks and/or equipment.


    12/10/2017

    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    Virtual Fax #hosted #fax #server


    #

    Virtual Fax Trends: Why the Fax Market Continues to Grow

    Use cases for fax continue to increase and the art of fax over IP continues to protect enterprises, especially with the rise of virtualization

    Fax analyst Peter Davidson reports: That is, the market is moving from using fax systems that work over conventional phone lines to fax that works over Internet lines.

    Virtualizing fax servers enables better management of fax server resources. Virtualizing the servers also makes it possible to run workstations and servers with different operating systems on the same fax server(s) concurrently. In this way, virtual servers enable users to do more with less.

    Another benefit to you is that fewer fax servers are needed to get the same fax capacity, saving money on hardware. Switching to a virtual fax server solution can reduce operating costs while still maintaining high-volume fax service.

    Another trend worth mentioning is that virtual fax servers are not the only option for implementing fax servers. Hosted fax (via the cloud) enables businesses to use their IP network to send and receive faxes via email.

    Biscom, a leading provider, provides a hosted fax service that is scalable, reliable, and secure. It enables businesses to take advantage of high-volume faxing without installing onsite servers. Biscom s software can also be integrated with MFPs for more functionality.

    To close, Biscom is the only provider offering a true enterprise server, virtual and host fax solution. B iscom offers both an on-premises server and a hosted service, Biscom can deliver a solution scaled precisely to an organization’s faxing volumes.

    Biscom, a longtime successful manufacturer of enterprise fax servers, offers a hosted fax service.

    Shields Healthcare: Thanks to Biscom, we no longer have problems with system flow or performance. Inbound orders received via fax or via online ordering are indexed and the application creates the workflow according to programmed business rules. It makes the jobs of our staff members and managers much easier.

    For more information on Biscom s Fax Server solutions, please contact us at 1-800-477-2472 to request a quote.


    11/10/2017

    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    Motivi Shop Online: Sito Ufficiale #online #web #server


    #

    Privacy Policy

    Ai sensi dell’articolo 13 del Decreto Legislativo 30 giugno 2003, n. 196 Codice in materia di protezione dei dati personali (di seguito “Codice Privacy”), la Miroglio Fashion S.r.l. in qualità di Titolare del trattamento, la informa che i dati da Lei forniti mediante la compilazione del form on line presente sul sito web, saranno trattati, manualmente ed elettronicamente, per l’invio periodico di materiale informativo, promozionale e/o pubblicitario per il tramite di e-mail, SMS e/o MMS, telefono e/o per il tramite di posta cartacea.

    Il trattamento e l’elaborazione dei dati avverrà mediante strumenti manuali ed informatici, con logiche strettamente correlate alle finalità sopra indicate, in modo da garantire la sicurezza e la riservatezza dei dati nel rispetto della normativa italiana in materia di privacy.

    I dati potranno essere comunicati a società appartenenti al gruppo Miroglio, quale Miroglio S.p.a. con sede in Alba (CN), Italia, esclusivamente per le attività connesse alla realizzazione delle finalità di cui al punto a).

    Titolare del trattamento dei dati è la Miroglio Fashion S.r.l. a cui potrà rivolgersi per iscritto per esercitare i suoi diritti ex art. 7 del codice (rettifica, cancellazione, aggiornamento, ecc.) o richiedere la lista completa dei responsabili del trattamento. Ogni comunicazione potrà essere inoltrata a Miroglio Fashion S.r.l. – Direzione Omnichannel, Via S.Barbara 11, 12051 – Alba (CN), Italia. Preso atto dell’informativa di cui all’art. 13 del Codice Privacy

    ALWAYS STAY IN CONTACT. SUBSCRIBE TO OUR NEWSLETTER

    Sign up for our newsletter to stay up to date on new products and exclusive promotions!

    This website uses cookies

    We use cookies, small text files downloaded by your computer while browsing on a website, to manage and improve website and sign-in operations and send you commercial information matching your preferences. If want to learn more or deny consent to all or some cookies click here By closing this banner, scrolling this page or clicking the acceptance button below you agree with and acknowledge the use of cookies.

    Accept and Continue

    Cookies are small text files that contain information about your visit to our website and are stored on your computer or any other device able to browse the internet, for example a smartphone or tablet. We use these cookies to make browsing our site easier, to show you content that is relevant to your needs and interests and to help us speed up your future visits and activities on our website. The cookies assist and simplify the interaction between the user and the site and allow the site to remember your preferences and individual activity, thus saving time and contributing to easier and more efficient browsing. Cookies memorise information about your visit online (for example; language, number of visits and dimensions of text) and aid the implementation of various services (user registration, contents of your shopping cart, subscription to newsletters or updates on products, etc.). Cookies are also employed to create anonymous group statistics that let us analyse how visitors use our site, allowing us to improve the structure, content and services of this site. Any services present that do not offer complete anonymity will be found in the third-party cookies list and you may deny them consent, safeguarding your privacy. This site makes use of three different types of cookies:

    1. Essential cookies

    These cookies ensure that the site works in a correct and fluid manner: they allow you to navigate between pages, share content, they memorise your sign-in credentials making access to the site faster and they keep your preferences and credentials active during browsing and purchasing. Without these cookies we would be unable to provide the services which motivate the user to access this site.

    2. Statistical cookies

    These cookies help us understand how our users browse the site and navigate the online store so that we may assess and improve its performance and create content that best matches our visitors’ preferences. For example, these cookies show us which are the most and least visited pages, how many people access the site, how long is spent on the site by most users and how they find us online. With this information we can find out which are the best features and which could be improved, while ensuring that site content is uploaded quickly and displayed appropriately. The information these cookies collect is anonymous and not associated with any of the user’s personal data. These functions on our site are managed by third-party service providers who render the data anonymous and untraceable to any single individual.

    3. Third-party profiling cookies

    These cookies are distributed by third parties and not directly controlled or under the control of Zerogrey. Zerogrey does not therefore accept liability regarding the use of any information collected by the owners of these third-party cookies. The cookies provided by such third parties can offer advanced features as well as more information and personalisation. These include the ability to share content across social network platforms and to maintain a personalised online site experience on the basis of any preferences expressed on pages previously visited. These services are for the most part offered by external operators. If you browse using an account or if you use third-party services on other websites, these may be able to track a user who has visited our site. The use of the data collected by these external operators through cookies must adhere to the respective privacy policies that you will find on the link copied below. Third-party profiling cookies are identified by the names of their respective operators in the list indicated below which also contains the tools for managing or disabling them.

    Managing your cookies

    You can change the settings for downloaded cookies on your computer or mobile device through the appropriate feature on your browser. You may also block the installation of third-party cookies and remove previously installed cookies, including those that define your cookie preferences that you may have may have set here. To check or adjust the settings on your browser you need to consult the instruction manual or your browser’s help window.

    Alternatively, to disable some or all cookies you can use the following tools. Disabling our cookies may affect your browsing experience, diminish efficiency in accessing certain parts of the site and erase preferences for future visits to the site. Remember to set the browser on your devices in a coherent manner so that each one may be adjusted to reflect your cookie preferences. Further detailed information on cookie features and how to enable or disable them on most browsers is available online at www.aboutcookies.org or http://www.allaboutcookies.org/privacy-policy.htm. For in-depth information and assistance with cookies used for advertising purposes visit http://www.youronlinechoices.com/it/


    10/10/2017

    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    Top 5 Security Settings in Group Policy for Windows Server 2008


    #

    Top 5 Security Settings in Group Policy for Windows Server 2008

    With over 5000 settings in the newly improved and enhanced Group Policy that comes with Windows Server 2008, it might be a bit overwhelming to think about which settings are most important to you and your network. Microsoft has really gone beyond the call of duty with some settings, as they fix issues and secure computers like we have always wanted to, but never had the tools before. Implementing these security settings for your desktops will increase the overall security, by reducing the attack surface that is available. Some settings only support Windows Vista, while others are backward compatible to Windows XP SP2.

    Control Local Administrators Group Membership

    One of the most insecure settings that can be granted to an end user is local administrative access. By adding the user account to the local Administrators group, the user is being granted nearly ultimate control over their desktop. The user can perform almost any action, even if the network is configured to deny this access. Actions that a user can perform, due to them having local administrative access, include, but are not limited to, the following:


    • Remove their computer from the domain
    • Modify any Registry setting
    • Modify permissions on any folder or file
    • Modify any system setting, including settings that are in files in the System folder
    • Install any application
    • Uninstall applications, security patches, or service packs
    • Access any Website allowed by firewall
    • Download and install ActiveX controls, Web applications, or other malicious applications downloaded from the Internet

    Although there is a need to have users running as administrator to allow certain applications to function, this type of access is very dangerous and exposes the desktop and the entire network to potential security breaches and attacks.

    With Windows server 2008 Group Policy, the current user can be removed from the local Administrators group with just one simple policy. This setting controls Windows XP SP2 and greater operating systems. This setting falls under the new Group Policy Preferences settings. To access this setting, open up a Group Policy Object and expand:

    User Configuration\Preferences\Control Panel

    Then, right-click on Local Users and Groups. From the menu, click on New – Local Group. The following dialog box will appear, as shown in Figure 1.

    To configure the policy, type in Administrators into the Group text box, then click on the “Remove the current User” check box. Upon the next Group Policy background refresh all user accounts that are under the scope of management of the GPO where this setting is configured will have their user account removed from the local Administrators group on the computer where they are logged in.

    Reset Local Administrator Password

    In conjunction with the first Group Policy setting, it is essential that the local Administrator password is also reset. This is due to the fact that the user had administrative privileges before removing them from the local Administrators group, therefore they could have reset the Administrator account password to something they know.

    Therefore, after the user account has been removed from the local Administrators group, the local Administrator account password must be reset. If this setting can be made simultaneously with the removal of the user account, the user will have no chance to know or alter the new local Administrator password.

    This setting controls Windows XP SP2 and greater operating systems. This setting falls under the new Group Policy Preferences settings. To access this setting, open up a Group Policy Object and expand:

    Computer Configuration\Preferences\Control Panel

    Then, right-click on Local Users and Groups. From the menu, click on New – Local User. The following dialog box will appear, as shown in Figure 2.

    To configure the policy, type in Administrator into the User name text box, then type the new password into the Password text box, confirming the password in Confirm Password text box. Upon the next Group Policy background refresh all computer accounts that are under the scope of management of the GPO where this setting is configured will have the local Administrator password reset.

    Windows Firewall with Advanced Security

    In the past users and administrators alike have stayed away fro musing the Windows Firewall, due to limited capabilities compared to other products. Now, the Windows Firewall comes with advanced security settings, which are certain to raise some eyebrows.

    The new advanced security features of Windows Firewall incorporate not only inbound and outbound filtering, but include IPSec.

    These settings can only control Windows Vista, which is the only desktop operating system that includes these options. This setting falls under the security area within a Group Policy. To access this setting, open up a Group Policy Object and expand:

    Computer Configuration\Policies\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security

    When you expand the policy, you will see three nodes:

    If you right-click on any of the options, you can select the New Rule option, which the inbound rule is shown in Figure 3.

    UAC

    User Account Control (UAC) provides an opportunity to help secure the computer where a user and an administrator is logged in. In my research and testing, UAC is ideal for all administrators and can be a good solution for standard users. Since UAC forces all users to be a standard user for all tasks, it helps protect against any application or virus that attempts to write to protected areas of the computer. It does this by prompting the user with a dialog box each time a protected area of the computer is accessed. This might be accessing an application, installing an application, modifying the registry, writing to a system file, etc.

    This is ideal for all administrators, as they can now use a single user account for their daily tasks, both for IT and for personal use. For standard users, the only way that UAC will function well is if all applications that run on the desktop can be run without requiring administrator credentials. In this situation, the user can perform all of the functions and run all applications as a standard user. Then, if a task needs to be performed that requires administrative access, they can get help from someone on the helpdesk or an administrator.

    The settings that control UAC can be found at ComputerConfiguration\Policies\Windows Settings\Security Settings\Local Policies\Security Options. which can all be seen in Figure 4.

    Password Policy

    Even though passwords are not all that attractive as a security setting, the ability to control passwords using Group Policy can’t be left off of the top 5 list. Windows Server 2008 still uses Group Policy to determine the initial account policy settings, which have not changed since Windows 2000. The settings are initially configured in the Default Domain Policy, but they can be made in any GPO which is linked to the domain. The only thing to keep in mind is that the GPO that contains the account policy settings must have the highest priority of all GPOs linked to the domain.

    The settings that you can configure include those shown in Figure 5 and the settings shown in Table 1.

    Here are some guidelines to follow for setting these policies:


    10/10/2017

    Posted In: NEWS

    Tags: , , ,

    Leave a Comment

    SNMP Monitoring Software #network #monitor, #network #monitoring, #server #monitor, #exchange #server,


    #

    SysUpTime Network Monitor

    Current Version: 6.1 (build 6204)

    SysUpTime network/server monitor is a powerful agentless network management software. It provides users out-of-box capabilities to efficiently and proactively manage any network of any size.

    SysUpTime network monitor is easy to set up and use. It can monitor the availability and performance of your Windows and Linux/UNIX servers, workstations, software applications (SQL, Exchange, Web Servers, etc), and network devices (routers, switches, etc). When a failure is detected, SysUpTime network monitor can alert the administrators by email, sound, running a script or other methods, as well as taking corrective actions such as executing remote Windows/Linux command, rebooting the machine, restarting the Windows/Linux service or running a script.

    SysUpTime network monitor’s server runs on both Windows and Linux.

    Key Features:

    Automatic Network Discovery and Accurate Topology Map

    Automatically discovers layer 1, 2 and 3 networks, gathering topology data to deliver complete and accurate maps of devices and connectivity across networks. Powerful map editing function allows user to add or change discovered map easily.

    The combination of unique extensible mediation layer technology and CIM (Common Information Model) based object model enables SysUpTime network monitor to support new devices and applications on an ongoing basis with minimum efforts.

    Major features of network discovery and topology maps:

    • Support for a wide range of network devices and new devices can be easily added.
    • Configurable filters to narrow down the scope of discovery.
    • SNMP v1/v2c/v3 discovery.
    • Scheduled discovery.
    • Support for VLAN, HSRP, VRRP.
    • Custom views, which are user-defined maps based on IP address, location or other selection criteria.
    • Automatically discovered topology maps contain properties of network devices such as servers, routers, etc. Device list can be exported to a CSV file.
    • Devices can be manually added to topology map.
    • New properties or notes, such as license info, installed software, purchase price, can be manually added to devices. You can do search to find device with certain property.

    Trended Performance, Status, and Service Monitoring

    Detailed monitoring of network availability and performance.

    • Fully Automated Performance Monitoring

    Core monitoring capabilities include:

    • Ping monitor
    • SNMP monitor(supports SNMP v1/v2c/v3 monitors)
    • MS Exchange server monitor
    • WMI monitor (Windows Services, Processes, CPU/Disk Utilization, etc.)
    • TCP/UDP port monitor
    • URL (HTTP/HTTPS) monitor
    • Telnet/SSH-2 monitor
    • FTP/File/Directory monitor
    • DNS/LDAP/RADIUS server monitor
    • Windows Event Log monitor
    • SMTP/POP3/IMAP4 server monitor
    • Database SQL monitor for all major database servers

    More network/server monitoring capabilities are scheduled to be added soon.

    • Self-learning Dynamic Statistical Baseline (based on historical data)
    • Multi-level Fixed Thresholds

    Real-time, End-to-End Event Management

    SysUpTime network monitor collects and consolidates events and alarms. Event de-duplication, event auto-clearing, robust alerting, automated actions, and alarm escalation help organizations identify potential problems faster, shorten mean-time-to-repair and reduce IT and operations costs.

    Core capabilities of event management include:

    • Supports SNMP v1/v2c/v3 traps and informs
    • Event reduction
    • Event clearing
    • Alarm escalation
    • Event forwarding
    • Event categorization

    SysUpTime network monitor offers a wide range of alerting actions. Major actions include:

    • Send to different email accounts at different time.
    • Forward to another trap receiver.
    • Post to a web site using GET or POST methods.
    • Run remote command via SSH, Telnet or Windows RPC.
    • Run command.
    • Play sound.
  • Built-in Reporting and Graphing

    SysUpTime network monitor offers real-time and historical reporting and graphing capabilities for performance monitors, and top-N reports for users to identify problem elements. Scheduled reports in PDF format can be generated by month, week or day.

    Application monitoring helps you diagnose application problems, and prevent downtime or network performance degradation. SysUpTime network monitor provides out-of-box support for MS Exchange Server and SQL server. It can be configured to monitor critical parameters of both servers and their services.

    High Availability and Scalability

    SysUpTime’s server clustering technology allows two or more servers that are interconnected to form a unified virtual computing resource.

    Clustering servers increases the availability of a system by ensuring that if a server becomes unavailable because of failure or planned downtime, another server in the cluster can assume the workload, ensuring that the monitoring service is uninterrupted. Clustering also enhances scalability by automatically distributing workloads across all the available servers.

  • Key Benefits

    • Intuitive graphical user interface minimizes training requirements and increases productivity
    • Advanced fault management minimizes equipment downtime
    • Measure and report real time performance against designated SLA
    • Preempt performance problems by identifying potential trouble spots before they affect service quality
    • Increased operational efficiency
    • Use trending data to make the most of network resources and forecast CapEx needs
    • Protect existing investments — can be integrated with existing management systems
    • Implement high-quality management capabilities priced to suit enterprise IT budgets

    Professional and free personal editions

    The free personal edition is intended exclusively for private use on a single workstation. You may copy the complete program package and pass it on to others for private use only. The free personal edition may not be used for commercial or professional purposes.

    The professional edition has many more features and can be used for commercial or professional purposes.

    Features Table


    09/10/2017

    Posted In: NEWS

    Tags: , , , , , , , , , , , ,

    Leave a Comment

    VPS hosting India, Virtual Private Server Hosting, Managed VPS Servers India:


    #

    VPS Hosting Server

    Virtual Private Server:-

    For every business, it’s important to ensure a robust infrastructure so that all the resources can perform their level best. In the present IT scenario, managed VPS hosting is a prime requirement for almost every business. Considering this, Ricoh offers a wide range of virtual private server plans.

    With advanced technology and customized plans, the virtual private servers offer the developers, the organizations and the designers more speed, stability and power. This enables them to run their websites and applications successfully. Moreover, we make the job of managing the servers easier for you as we do it on your behalf.

    We offer absolutely customizable VPS plans so that our customers can choose one, based on their requirements. Whether you want semi-managed VPS plans or fully managed ones, we offer both the types so that your needs are perfectly met. Although the semi-managed plans that we offer don’t include a hosting control panel, but these include complete assistance with operating system, hardware and basic configuration issues. On the other hand, if you opt for a fully managed plan, you are entitled to complete assistance about any configuration request or any issue.

    VPS Hosting Pricing Plan

    ADVANCED HOSTING SOLUTIONS

    We know that for most businesses, online promotion is a very important aspect, given the wide audience to which they have to cater to. But before you can promote your business through your website‚ it is imperative to choose a reliable service provider from whom you would avail the web hosting solutions. Since we offer a wide range of advanced and secure hosting solutions, you can rely on us.

    HIGH TRAFFIC

    For websites that deal with high traffic, a VPS hosting is a preferable and affordable hosting solution since the resources are scalable and flexible. We provide you with completely scalable solutions so that you can manage and allot the resources according to the needs of your website/application. Whether it’s about handling high traffic or expanding it as your business grows, you can easily handle the entire matter.

    LOW MAINTENANCE COST

    Since dedicated servers are quite costly and need daily maintenance, we consider VPS as a better alternative. We simply allot the required disk space and bandwidth to the organization and maintain the system on our own, allowing the organization to focus on their core business issues.

    24X7 SUPPORT

    Ricoh provides Virtual Private Servers with a guaranteed 24/7 support from skilled personnel at zero maintenance cost, thus ensuring a reliable, powerful and hassle-free hosting solution for you.

    BETTER CUSTOMIZABILITY

    At Ricoh, we ensure complete customizability of VPS, as per the requirements of the customer. We provide each of our customers with a control panel which can be used to scale the resources, allocated as per his needs. Also, we allow the users to create sub-domains as and when they need to.

    HIGHLY SECURED

    Ricoh’s VPS solutions ensure improved security and performance and this is why it is preferred by enterprises that are running on a tight budget. We ensure there is no unauthorized access of data or data theft, by giving complete control over the resources and data to the users.

    Benefits of Virtual Private Server

    Improved Reliability And Scalability

    It’s known to all that when you host your website or application on a shared server, the performance and uptime of that might get impacted by the other applications or websites that are hosted on the same server. On the other hand, if you host your application on a virtual private server, it will help you enjoy improved reliability and stability. At times, hosting on a shared server also poses great risk to your business.

    More Control as Compared to Shared Hosting

    While hosting your website or application, won’t you like to get full root access to the environment? Well, a VPS offers exactly the same. In this way, if you need to install a custom software package, you can do the same on your own. Unlike a shared hosting system, you won’t have to wait for the hosting provider’s permission. The shared web servers are usually optimized for the best possible service and security. Due to the different security limitations, you can’t modify the application just the way you want. With a virtual private server, you can actually avoid all these issues.

    Efficient Use of Resources

    One of the main advantages of moving to a VPS is that you can make the best possible use of all your resources. With a dedicated server hosting, you can take all the resources of a server. This ensures you are the only person to make use of the power of the entire server. This undoubtedly results in improved services, leading to better user experience.

    Improved Scalability

    Businesses that are going to launch a number of new websites get benefitted with a VPS. There are certain websites that are already established, and no longer expect a huge difference when it comes to the website traffic. Unlike these, websites that are newly launched expect a lot of traffic. This is where a virtual private sever helps you best since this acts as a reliable hosting resource with minimal technical issues and without any or minimum possible downtime.


    09/10/2017

    Posted In: NEWS

    Tags: , , , , , , , ,

    Leave a Comment

    PowerShell Script To Create A Converged Fabric For Clustered Windows Server


    #

    Aidan Finn, IT Pro

    PowerShell Script To Create A Converged Fabric For Clustered Windows Server 2012 Hyper-V Host

    Posted on May 31, 2012 by AFinn in Hyper-V // 12 Comments

    Note: This post was originally written using the Windows Server 8 (aka 2012) Beta. The PowerShell cmdlets have changed in the Release Candidate and this code has been corrected to suit it.

    After the posts of the last few weeks, I thought I’d share a script that I am using to build a converged fabric hosts in the lab. Some notes:

    1. You have installed Windows Server 2012 on the machine.
    2. You are either on the console or using something like iLO/DRAC to get KVM access.
    3. All NICs on the host will be used for the converged fabric. You can tweak this.
    4. This will not create a virtual NIC in the management OS (parent partition or host OS).
    5. You will make a different copy of the script for each host in the cluster to change the IPs.
    6. You could strip out all but the Host-Parent NIC to create converged fabric for standalone host with 2 or 4 * 1 GbE NICs

    And finally …. MSFT has not published best practices yet. This is still a beta release. Please verify that you are following best practices before you use this script.

    OK…. here we go. Watch out for the line breaks if you copy paste:

    write-host Creating virtual switch with QoS enabled
    New-VMSwitch ConvergedNetSwitch -MinimumBandwidthMode weight -NetAdapterName ConvergedNetTeam -AllowManagementOS 0

    write-host Setting default QoS policy
    Set-VMSwitch ConvergedNetSwitch -DefaultFlowMinimumBandwidthWeight 10

    write-host Creating virtual NICs for the management OS
    Add-VMNetworkAdapter -ManagementOS -Name Host-Parent -SwitchName ConvergedNetSwitch
    Set-VMNetworkAdapter -ManagementOS -Name Host-Parent -MinimumBandwidthWeight 10

    Add-VMNetworkAdapter -ManagementOS -Name Host-Cluster -SwitchName ConvergedNetSwitch
    Set-VMNetworkAdapter -ManagementOS -Name Host-Cluster -MinimumBandwidthWeight 10

    Add-VMNetworkAdapter -ManagementOS -Name Host-LiveMigration -SwitchName ConvergedNetSwitch
    Set-VMNetworkAdapter -ManagementOS -Name Host-LiveMigration -MinimumBandwidthWeight 10

    Add-VMNetworkAdapter -ManagementOS -Name Host-iSCSI1 -SwitchName ConvergedNetSwitch
    Set-VMNetworkAdapter -ManagementOS -Name Host-iSCSI1 -MinimumBandwidthWeight 10

    #Add-VMNetworkAdapter -ManagementOS -Name Host-iSCSI2 -SwitchName ConvergedNetSwitch
    #Set-VMNetworkAdapter -ManagementOS -Name Host-iSCSI2 -MinimumBandwidthWeight 15

    write-host Waiting 30 seconds for virtual devices to initialise
    Start-Sleep -s 30

    write-host Configuring IPv4 addresses for the management OS virtual NICs
    New-NetIPAddress -InterfaceAlias vEthernet (Host-Parent) -IPAddress 192.168.1.51 -PrefixLength 24 -DefaultGateway 192.168.1.1
    Set-DnsClientServerAddress -InterfaceAlias vEthernet (Host-Parent) -ServerAddresses 192.168.1.40

    New-NetIPAddress -InterfaceAlias vEthernet (Host-Cluster) -IPAddress 172.16.1.1 -PrefixLength 24

    New-NetIPAddress -InterfaceAlias vEthernet (Host-LiveMigration) -IPAddress 172.16.2.1 -PrefixLength 24

    New-NetIPAddress -InterfaceAlias vEthernet (Host-iSCSI1) -IPAddress 10.0.1.55 -PrefixLength 24

    #New-NetIPAddress -InterfaceAlias vEthernet (Host-iSCSI2) -IPAddress 10.0.1.56 -PrefixLength 24

    That will set up the following architecture:

    QoS is set up as follows:

    • The default (unspecified links) is 10% minimum
    • Parent: 10%
    • Cluster: 10%
    • Live Migration: 20%

    My lab has a single VLAN network. In production, you should have VLANs and trunk the physical switch ports. Then (I believe), you’ll need to add a line for each virtual NIC in the management OS (host) to specify the right VLAN (I ve not tested this line yet on the RC release of WS2012 watch out for teh VMNetowrkAdaptername parameter):

    Set-VMNetworkAdapterVLAN –ManagementOS –VMNetworkAdapterName vEthernet (Host-Parent) –Trunk –AllowedVLANList 101

    Now you have all the cluster connections you need, with NIC teaming, using maybe 2 * 10 GbE, 4 * 1 GbE, or maybe even 4 * 10 GbE if you’re lucky.

    Please follow and like us:

    This works in Windows 8, I assume Server 2012 as well:

    add-vmnetworkadapter -managementOS -name Storage -SwitchName New Virtual Switch
    get-vmnetworkadapter -managementos -name Storage | set-vmnetworkadaptervlan -access -vlanid 213

    Trunk commands do require the NativeVlanID and AllowedVlanIDList as well.

    If i have two 10G Broadcom NICs on my server, can I team the two NICs using WS2012 native NIC teaming and create virtual switches to use for Management, Cluster, VM traffic and also for ISCSI traffic.
    ISCSI only for VM in-guest clustering.
    Can I create ISCSI virtual NICs on teamed physical NICs. Do Microsoft best practices allow this?

    I ve discussed this plenty on my blog. There s a search option on the top right.

    Tried to deploy described scenario in my lab and some time later VMM 2012 SP1 crashed all those dreams in one click I suppose ConvergedFabric scenario are not supported one by VMM only I ve done is Allow host access using VLAN: 0 checkbox cleared (Host properties – Virtual Switches – ConvergetNetSwitch). Then VMM killed all vNICs created in PoSh and left host on it s own without connections.

    VMM network deployment is incompatible with any networking you deploy directly on a host. It will overwrite it, and likely break VM connectivity. You have to choose one or the other.

    is this for outgoing traffic only or does this work for incoming too?
    if so do you have to configure switches to get most out of this?

    Outgoing. You can tag packets for the switches to apply QoS too.

    Just wondering what switch independent teaming would be used in this scenario, seeing as VMs (usually Hyper-V Port) would also be connected?

    I ve a team of two physical nics with three virtual nics presented to the OS. The associated physical switch ports are trunked. I ve tried a couple of variations of the set-vmnetworkadaptervlan cmdlet, but unable to communicate with the virtual nics. On each host, I can ping the relevant IP addresses for each virtual nic, but cannot ping beyond the host. Any suggestions welcome.

    Set-VMNetworkAdapterVlan –ManagementOS –VMNetworkAdapterName Management –Access –VlanId 151

    Set-VMNetworkAdapterVLAN -ManagementOS -VMNetworkAdapterName Management -Trunk -NativeVlanId 151 -AllowedVlanIdList 151

    Leave a comment Cancel reply


    01/10/2017

    Posted In: NEWS

    Tags: , , , , , ,

    Leave a Comment

    Guide to SQL Server virtualization best practices #server #and #storage #virtualization


    #

    Guide to SQL Server virtualization best practices

    Introduction

    Enterprises who seek better control over resource management and allocation may find help with virtualization technologies. SQL Server virtualization enables consolidation, which boosts efficiency. Recent developments have brought about very powerful virtual machines that can manage larger capacities and provide faster provisioning of the database environment. In addition, SQL Server virtualization is cost-effective and convenient.

    While SQL Server virtualization offers numerous benefits, database administrators and other lead IT staffers must closely examine issues surrounding licensing, performance and availability before implementing virtualization. And an enterprise may have what is needed to implement a virtual environment, but do they have the proper support to manage one? Virtual machines also have scaling limitations to take into consideration.

    Making the shift to virtualization is a big decision that requires careful research. This guide offers insights into virtualization advances and drawbacks, as well as SQL Server virtualization best practices and issues related to licensing.

    1 News and trends –

    SQL Server virtualization news and trends

    Entering the world of virtualization is a mind-set change for traditional IT staff. Virtual machine management software performs load balancing and provisioning, and system administrators must adjust to not knowing the physical locations of everything at all times. The articles in this section discuss various considerations for virtualizing SQL Server, from hardware to tools to security concerns.

    Virtualization may be taking data centers by storm, but what’s behind the trend? In this month’s “SQL in Five,” SearchSQLServer.com asks Microsoft’s Mark Kromer about the benefits and difficulties of virtualizing SQL Server. Continue Reading

    Buying hardware for SQL Server virtualization hosts entails some specialized shopping skills. Get some expert tips on what to look for. Continue Reading

    There’s been a slew of new Microsoft products lately, including an upgrade for Project Atlanta. A company expert discusses this development, third-party tools and more. Continue Reading

    As SQL Server BI catches on among small businesses, questions about whether SQL Server virtualization is compatible are bound to follow. Get an expert take on what you need to know for virtualized BI to work. Continue Reading

    SQL Server security issues in virtualized environments pretty much mirror the challenges in physical environments, experts say. Standard security guidelines apply. Continue Reading

    2 Exploring the cons –

    Different perspectives on SQL Server virtualization

    Virtualization adds another layer of complexity to the server environment, which can contribute to communication breakdowns between database administrators and other members of the IT team. The resources necessary for virtual machine implementation require planning, provisioning and management. Experts discuss these and other complications associated with SQL Server virtualization in this section.

    Virtualizing SQL Server is a good idea for many IT shops, but it’s not for everyone. Robert Sheldon explains when it might not be a good choice. Continue Reading

    Do SQL Server high availability and virtualization go together or not? Find out if virtualization is a good option for you in this tip by Bob Sheldon. Continue Reading

    SQL Server virtualization may seem like a magic bullet, but there a few scenarios that might cause businesses to reconsider. Continue Reading

    SQL Server consolidation could save your company big money, writes expert Denny Cherry, but first you’ll need to examine metrics like concurrent connections, buffer pool size and drive space. Continue Reading

    Virtualization promises big savings for businesses, and few are decrying its influence. But is it always the answer? Are there SQL Server virtualization risks to learn about first? Continue Reading

    Download this free guide

    SQL Server Import & Export Wizard Step-By-Step Tutorial

    In this expert-led tutorial, senior DBA and technical trainer Basit Farooq provides a step-by-step guide for using the SQL Server Import and Export Wizard to transfer data between SQL Server databases and Microsoft Excel worksheets.

    By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

    You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy .

    3 Best practices –

    SQL Server virtualization best practices

    Experienced users recommend following a few steps to achieve SQL Server virtualization success. These steps include identifying the best hardware and software for your enterprise’s needs, comparing costs and performance, examining the impacts of server migration, and making preparations to maintain high availability. The stories in this section offer expert advice for moving forward with virtualization.

    Thinking about virtualizing SQL Server? Roman Rehak gives you a rundown about what you should keep in mind when planning your migration. Continue Reading

    With benefits such as cost savings and high-availability options, SQL Server virtualization is taking the IT world by storm. Here are a few things to keep in mind. Continue Reading

    Learn to take advantage of Hyper-V and Windows 2008 in order to achieve fault-tolerant and highly available SQL Server virtual machines. Continue Reading

    Creating a private SQL Server VAP will reduce the time it takes to deploy additional SQL Server machines in your environment. Continue Reading

    Learn how database mirroring provides cost-effective protection for critical databases running on virtual machines. Continue Reading

    4 Licensing issues –

    SQL Server virtualization licensing

    Virtualizing the SQL Server environment can lower licensing costs, but the licensing process can be challenging. The decision of how to license SQL Server depends on the version and edition your company is running, as well as the number of processors on the machine. It is helpful to fully understand licensing implications before moving forward with virtualization. This section offers stories that explore the issue of licensing.

    SQL Server 2012 licensing is complicated enough. Now add in SQL Server virtual environments and try not to let your head spin. Continue Reading

    DH2i’s server application virtualization software lowers SQL Server 2012 license requirements by stacking many instances on a single Windows server. Continue Reading

    SQL Server 2012 pricing includes some significant adjustments, including a reduction in the number of editions and the change from processor- to core-based licensing. Continue Reading

    The company has put the kibosh on unlimited virtualization rights with SQL Server 2008 R2 Enterprise Edition. Continue Reading


    30/09/2017

    Posted In: NEWS

    Tags: , , ,

    Leave a Comment

    Using SQL Developer to connect to SQL Server databases #sql #server,sql


    Using SQL Developer to connect to SQL Server databases

    Apparently, being able to use Oracle s SQL Developer to connect to SQL Server databases has been around for a while (via third party drivers), but I only started using it today for the first time, with SQL Developer 4 EA2 after my colleague mentioned it to me this afternoon

    First of all, thanks to DJ s blog here as a base for the instructions that follow. Here s how you can set this up:

    1. Download the jTDS 3rd party JDBC driver, version 1.2.8 from here (I ve not personally tested with other versions).
    2. Save and extract the contents of the jtds-1.2.8-dist.zip file somewhere safe (I extracted mine under C:\oracle\sqldeveloper\add-ons\jtds-1.2.8-dist\ ).
    3. Start SQL Developer go to Tools Preferences Database Third Party JDBC Drivers.
    4. Click “Add Entry”, point to the jtds-1.2.8.jar file location, then select it and click OK.
    5. Create a new connection, and choose the SQLServer tab.
    6. Enter the following details: Connection Name (required for database retrieval), Username, Password, Hostname, and Port.
    7. Click Retrieve database and select the appropriate database, then Save/Test/Connect as you would do normally.

    You ll notice from the screen shot above that you can also use this to connect to Sybase databases, although I ve not tried this out myself.

    UPDATE: If you at any point decide to use Windows authentication to connect (like I just did), then you might hit this error:

    Status. Failure -I/O Error: SSO Failed: Native SSPI library not loaded. Check the java.library.path system property.

    …I quickly found a work around, which involved copying the ..\jtds-1.2\x64\SSO\ntlmauth.dll file from the jTDS directory to the %JAVA_HOME%\jre\bin folder. Then I restarted SQL Developer and it all worked fine

    This works, but unfortunately there are a number of shortcomings. Some key words used in T-SQL and SQL Server scripts like GO and EXEC don t play nicely with Oracle SQL Developer. Also issues with Stored procs that return multiple result sets etc. It really depends on your environment, but if you re dealing with a lot of large scripts that were written in T-SQL you ll find issues.

    Thanks for the heads up I never really spent too much time using SQL Developer for managing SQL Server (defaulted to using SSMS), so that s good to know. Hopefully the development team will pick up on such issues and fix in later releases though


    30/09/2017

    Posted In: NEWS

    Tags: , , , ,

    Leave a Comment

    Linux and Windows Dedicated Servers in USA and Switzerland #dedicated #server,


    #

    Dedicated Servers
    Managed Linux and Windows Servers

    • Server Location – USA/Switzerland & Rapid Setup
    • Dedicated Hardware – Plenty Of CPUs, RAM & HDD & SSD
    • Intel Xeon CPUs, KVM Access, IPv4 & IPv6 IPs
    • CentOS, Debian, Ubuntu, Windows Server 2008/2012/2016

    Intel Xeon
    E3-1240v6
    USA Dedicated Server

    • 8 x 3.7 GHz CPU Cores
    • 10 TB Monthly Bandwidth
    • 16 GB RAM (max. 64 GB)
    • 5 IPs + IPv6 (max. 256 IPs)
    • 1 TB HDD / 128 GB SSD
    • 1 Gbit Port + KVM

    Add & Configure
    Intel Xeon E3-1240v6
    Dedicated Server

    Dual Intel Xeon
    2 x X5650
    Switzerland Dedicated Server

    • 24 x 2.66 GHz CPU Cores
    • 10 TB Monthly Bandwidth
    • 16 GB RAM (max. 128 GB)
    • 5 IPs + IPv6 (max. 256 IPs)
    • 1 TB HDD / 256 GB SSD
    • 1 Gbit Port + KVM

    Add & Configure
    2 x Intel Xeon X5650
    Dedicated Server

    Dual Intel Xeon
    2 x E5-2620v4
    USA Dedicated Server

    • 32 x 2.1 GHz CPU Cores
    • 10 TB Monthly Bandwidth
    • 16 GB RAM (max. 256 GB)
    • 5 IPs + IPv6 (max. 256 IPs)
    • 1 TB HDD / 128 GB SSD
    • 1 Gbit Port + KVM

    Add & Configure
    2 x Intel Xeon E5-2620v4
    Dedicated Server

    Dual Intel Xeon
    2 x E5-2670
    Switzerland Dedicated Server

    • 32 x 2.6 GHz CPU Cores
    • 10 TB Monthly Bandwidth
    • 16 GB RAM (max. 128GB)
    • 5 IPs + IPv6 (max. 256 IPs)
    • 1 TB HDD / 256 GB SSD
    • 1 Gbit Port + KVM

    Add & Configure
    2 x Intel Xeon E5-2670
    Dedicated Server

    USA Switzerland Dedicated Server Features

    • Choice of operating systems We offer a wide range of operating systems to run on your dedicated server. You can choose between CentOS, Ubuntu, Debian, and Windows Server 2008 R2/2012 R2/2016. All the operating systems are offered in 32 and 64bit version.
    • Wide selection of control panels You can choose between cPanel/WHM, Parallels Plesk Panel or bare dedicated server without panel (SSH access for Linux and RDP for Windows Server operating systems).
    • Full administrative access Each dedicated server offers a full Root access via SSH (for Linux OS based servers) and Administrator access via RDP (for Windows OS based servers). This allows you to install a variety of software: VPN, VNC, FFMPEG, IRC server, DNS, Mail Server, Web server, Private proxy. Remote desktop (RDP), Game server, ROR, SVN, Shoutcast.
    • Stable server platform Stable and secure dedicated servers with Intel Xeon processors (CPU), ECC DDR3/4 memory and RAID HDD array. We offer only dedicated servers of top-branded Supermicro and HP servers with RAID array for the highest security of your data.
    • OS reinstallations, DNS and reboots We can re-install your server with the operating system of your choice (Linux or Windows). We can also reboot your server at any time by submitting a support request. Also, we will help you in case you need RDNS or DNS setup.
    • IPv4 and IPv6 addresses You can add both IPv4 and IPv6 addresses later with a support request. As an additional option, we offer IPv4 addresses from different subnets (SEO IPs). We also offer native IPv6 support free of charge in all locations.
    Hosting, Domains, Servers & SSL
    About QHoster, Contacts & Support
    Have Questions?
    877-423-1155

    * Minimum sign up periods for cPanel Web Hosting plans: Mini – 3mo. Pro – 1mo. Biz – 1mo. cPanel Reseller Hosting, Linux VPS, Windows VPS, Managed cPanel VPS and Dedicated Servers – 1mo. secret link
    Accepted payments: Credit/Debit Card, Paypal, Payza, Skrill, WebMoney, CashU, Ukash, paysafecard, Bitcoin, Perfect Money, SolidTrust Pay, OKPay, EgoPay, Western Union/MG, Wire Transfer and more .


    30/09/2017

    Posted In: NEWS

    Tags: , , , , , , , , ,

    Leave a Comment

    How to restore Windows Server 2003 system files #server # #r


    #

    How to restore Windows Server 2003 system files

    There are multiple solutions for this:


      Extract the file using the automated System File Checker

      1. Click Start Run
      2. In the Run dialog box, type the following text:

    The Windows File Protection dialog box appears and a system scan begins.
    You may have to insert your Windows installation CD.

  • Follow the prompts.

    • Use the System Configuration utility to restore a system file(s)

        1. Insert your Windows Server 2003 installation disk into your CD drive or DVD drive.
        2. Click Start Run
        3. In the Run dialog box, type the following text:
    • Click OK .
    • On the General tab, click Expand File .
    • In the File to restore box, type the name of the file you want to expand.
      • Or, to locate the file you want to replace, click Browse File. and then click Open .
    • In the Restore from box, type the path from which to restore the file.
      • Or, to locate the source file you want to expand on your Windows Server 2003 installation disk, click Browse From. and then click Open .
    • If the Save file in box is not already populated from step 4, type the path to which you want the file to be restored.
      • Or, to locate the destination folder you want to expand the file into, click Browse To. and then click OK .
    • Click Expand .

      Use Expand.exe at a command prompt to restore a system file(s)

        1. Insert your Windows Server 2003 installation disk into your CD drive or DVD drive.
        2. Click Start Run
        3. In the Run dialog box, type the following text:

      cmd

    • Click OK .
    • In the command prompt type the following:
      cd\
    • Press ENTER .
    • At the command prompt, type:

      expand -r source destination

      Where source is the path to the file that you want to expand on the Windows Server 2003 installation disk, and destination is the path to the location where you want to save the file,

      • EXAMPLE:
        expand –r D:\i386\sfc.dl_ %systemroot%\system32
      • Press ENTER .

    Business Web Hosting, Domain Name Registration, Dedicated Server by Asia Web


    #

    Business Web Hosting

    Need reliable web hosting for your personal or business web site? You’re looking at the right place, Asia Web Solutions offer some of the best and most cost effective web hosting solutions in the industry. We have five web hosting plans to choose from. No matter whats your experience level or site activity, we have a web site hosting plan that’s right for you. We offer several web hosting add-ons to give your current hosting plan the boost it needs. Please feel free to contact one of our web hosting support representatives, they will be happy to assist you.

    Free Domain – No Setup Fee for Web Hosting!

    Our web design team are very busy over the last weeks and revamp our web hosting site to a new look. Find out more on the various pages. Please give us your comments and critics and let us know what you think about it. We look forward to your feedback on our new look.

    As Thank You we start the Summer Season with a Free Domain and waive the Setup Fee. We include in every new web hosting plan sold in the periode of time from May’08 until July’08 a FREE DOMAIN NAME. [.com. net. org. biz. info] and we will waive the SETUP FEE.


    26/09/2017

    Posted In: NEWS

    Tags: , , , , , , , , , ,

    Leave a Comment

    How to Reset #windows #server # #reset #administrator #password


    #

    How to Reset / Recover / Change Forgotten Administrator Password in Windows?

    Many times we face this problem when we or our friends forget Administrator account password in Windows and can’t log into Windows. So here we are posting a few methods which can be used to change, reset or recover forgotten Windows password in Windows.

    DISCLAIMER: Following information should be used only if its your system and you have forgotten account password. Don’t use this information to access a system which is not yours without permission.

    Method 1: Using Welcome or Login Screen

    This method is the first thing which should always do whenever you forget your Windows login password. When we install Windows, it automatically creates a hidden user account “Administrator ” and sets its password to blank. So if you forget your user account password then try this:

    1. Start your computer and when you see Windows Welcome screen (Login screen), press ctrl + alt + del keys twice and it’ll show Classic Login box.

    2. Now type Administrator in Username box and leave Password box empty. Now press Enter and you should be able to log into Windows.

    3. Now you can reset your account password from “Control Panel – User Accounts “.

    Same thing can be done using Safe Mode. In Safe Mode Windows will show this in-built Administrator account in Login screen.

    Method 2: Using Password Reset Disk

    Windows XP and later Windows versions provide a built-in method to recover forgotten password by using “Password Reset Disk “. If you created a Password Reset Disk in past, you can use that disk to reset the password.

    If you don’t know how to create a password reset disk, lets tell you in details. You can create the password reset disk using Control panel – User Accounts applet.

    First open Control Panel and click on User Accounts icon. It’ll open User Accounts window. Now click on your user account and then click on “Prevent a forgotten password ” link given in left-side pane. It’ll open forgotten password wizard as shown in following screenshot:

    Follow the instructions and you’ll have a password reset disk in your hand.

    Method 3: Using “Net User” DOS Command

    You can also use a built-in DOS command “Net User ” to change any desired user account password within seconds. You’ll need access to Command Prompt window in this method:

    1. Open Command Prompt as Administrator as mentioned here and run following command:

    2. It’ll list all available user accounts in Windows.

    3. Now run following command:

    net user user_name new_password

    Replace “user_name ” with the desired user account name and replace “new_password ” with your desired password.

    net user “Vishal Gupta” 12345

    Here “Vishal Gupta” is the user account name and 12345 is the new password.

    4. That’s it. It’ll immediately change the user account password.

    Thanks to our reader “rkk djb” for sharing this trick.

    Method 4: Using Windows XP Setup Loophole

    If the above mentioned tricks don’t work for you, try following trick which is actually a loophole in Windows XP Setup and also a big security hole:

    1. Boot using Windows XP Setup CD and follow the instruction like Accepting EULA, etc.

    2. When it asks to repair your existing Windows installation, accept it and press ” R ” key to run the repair.

    3. Setup will start repairing your Windows and will start copying files, etc.

    4. After a few minutes setup will restart your system and when it restarts, don’t press any key when it shows “Press any key to continue. “. Otherwise Setup will start from the beginning. Don’t press any key and setup will resume where it left.

    5. Now it’ll start doing other tasks and will show a small progressbar with a few details in left side.

    6. Look carefully at the details and when it shows “Installing devices “, press Shift +F10 keys together in your keyboard.

    7. It’ll open a Command Prompt window. Now type nusrmgr.cpl and press Enter key.

    8. It’ll open the same “User Accounts” window which you see in Control Panel.

    9. Now you can remove or reset any account password without any problem.

    Method 5: Using Bootable Rescue Disk

    You can also use various bootable rescue CDs to reset your Windows password as mentioned in following link:

    Method 6: Perform a Clean Installation of Windows

    If all fails, simply reinstall Windows and create new user account. To recover lost data, you can use Data recovery tools available on net but the chances will be less to get your data back.

    That’s all we can suggest. If you know about any other method or tool, feel free to share it in your comment.


    25/09/2017

    Posted In: NEWS

    Tags: , , , ,

    Leave a Comment

    SQL Server – SQL INSERT Stored Procedure #stored #procedure, #sql #server,


    #

    SQL Server Stored Procedure – INSERT – Example

    Source code to create and add sql insert stored procedure to catalog

    The following example is for creating a simple insert stored procedure. You can run it through an explicit call from a host language program or directly from a DBMS query execution shell like SQL Server Management Studio or dbOrchestra.

    You will note that just like in a INSERT statement you do not have to use all of the columns available when creating a stored procedure. You must however populate all columnar data associated with the PK (primary key), and columns associated with unique indexes (note: there are exceptions to this, but they will not addressed here), and columns defined in the ddl as NOT NULL .

    Executing the sql insert stored procedure

    Execute insert stored procedure

    To run the insert stored procedure you need to supply a value to the student_id variable as well as populate all required data. In this example I have included a cross section of columns for your reference, as well as the datatype associated with the columns in our SQL INSERT.

    A few thing to point out regarding the code above. Datetime and character data is entered using single quoted string. Integer data is entered without quotes. I also included all columns that were defined as NOT NULL. I also included the password column which is part of a unique index. You will note that I did not include columns for some of the non-unique indexes (soc_sec_num, other_id_num, and driver_license_num). I did this intentionally to demonstrate that they are not required columns. Having said this, in the real world one would only put indexes on columns where the intent was to actually collect the data for that column. I just wanted to make a technical point here. The pragmatic point is that you would want to expose columns that are part of indexes.

    What stored row looks like after the SQL INSERT

    I want to call you attention to the fact that all columns that are not referenced in the query get set to null. Also, if the schema had default values defined these would also get stored for that column when the rows gets inserted.

    SQL Server Information and Resources


    24/09/2017

    Posted In: NEWS

    Tags: , , , , ,

    Leave a Comment

    Business Voice, VPS, Colocation – Internet Connectivity Service Seattle, Bellevue –


    #

    Home Personal Services

    We offer a wide range of access options and services to residential customers and we have state of the art equipment and technology to provide fast and reliable connections for our customers. Our expert support staff is available to assist our residential customers with professional service to help with anything from getting connected to troubleshooting.

    Residential Connectivity Services:

    • Web Page Hosting with several options available for your personal page.
    • DSL Internet Services featuring exceptionally fast speeds
    • Dial-Up Internet provides an affordable solution for residential internet connections
    • TrueRing Home Phone with low prices and no set up fees

    Digital Home Phone

    Unlimited Calling only 24.99 /month

    • Keep your current number
    • Use your existing phone
    • No computer needed

    Personal Web Hosting

    Less than 3 a Month!

    • Unlimited space, bandwidth databases
    • Unlimited e-mail
    • FREE domain name

    If you are looking for VPS. business internet connectivity, or other services for your home or business in Bellevue, Redmond, or Seattle, you will find additional information about our residential and commercial services on our website.

    1994 2017, ISOMEDIA Inc.

    12842 Interurban Ave S, Seattle, Washington 98168


    23/09/2017

    Posted In: NEWS

    Tags: , , , , , , , , , , , , , , , , , , , ,

    Leave a Comment

    Mac Mail not connecting to Exchange Server – Part 1 #mail


    #

    Mac Mail not connecting to Exchange Server – Part 1

    Microsoft Outlook 2013/2016 clients on PC did not exhibit any issues. Latest Microsoft Outlook for Mac did not exhibit any issues either!

    It is worth pointing out that while Outlook 2013/2016 on PC use MAPI/HTTP or RPC/HTTP to connect to Exchange 2013/2016 servers, both clients on Mac (Mac‘s own Mail client and Microsoft Outlook for Mac) use EWS to connect.

    Mac Mail would show “Account Error” which read “Unable to connect … The server returned error: Connections to host mail.contoso.com on default ports failed.”

    The error is somewhat misleading as when you look at EWS logs on Exchange server, you see that the server rejected the request with HTTP error 400 which translated to “bad request”. What I didn’t know at that point is which element in the HTTP request was causing the server to reject the request.

    Microsoft provides great testing tools for Exchange on www.exrca.com. so I decided to run EWS connectivity test from the toolset. To my surprise, the test failed with the error “Message: The request failed. The remote server returned an error: (501) Not Implemented.”

    I knew about this particular error as I had worked with Michael Van Horenbeeck and is documented here:

    After enabling L7 debug tracing on my KEMP LoadMaster I observed the same error mentioned in the above articles “lb100 kernel: L7: badrequest-client_read [157.56.138.142:51830- 66.252.99.125:443] (-501): ?xml. 0 [hlen 1405, nhdrs 11]”

    It would be easy to blame load balancer at this point and implement the recommended fix by changing 100-continue handling on LoadMaster. But if that was the issue, why did Outlook for Mac work without any errors?

    Anyhow, I proceeded changing the 100-continue handling by changing it from default setting of RFC-2616 compliant, to RFC-7231 compliant instead:

    After changing this setting, I ran the EWS test from exrca website again, and as one would expect, the test passed with no issues.

    It did, however, failed to address the issue for Mac Mail client! No eureka moment, just yet!

    I will cover details of further troubleshooting in second part of this article. You can read it here.

    Featured Links


    23/09/2017

    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    Index page, unreal media server.#Unreal #media #server


    #

    Navigation

    Notice

    This iteration of UnrealSP.org has proven difficult to maintain. It will eventually be replaced by a new version, backed by a new CMS.

    Until then, site contents are available on the Legacy site.

    Additionally, newer content written by our staff is available in a temporary subforum.

    We sincerely apologize for the delays in recreating the site.

    Quicklinks

    • Legacy website
    • House rules
    • Upcoming projects
    • Project reviews

    IRC Chatroom

    Visit our chat and have a real-time talk with the regulars! Become one yourself!

    • Navigate: Home

    Welcome to UnrealSP.org

    • Sign up or log-in to remove this introduction

    For discussion about UnrealSP.org itself.

    Newer articles published by UnrealSP.org staff can be found here until the main site’s renewal comes to fruition.

    For gameplay advice and broader discussion of single-player Unreal including custom maps, mods and mutations that alter the game.

    For questions and discussion about UnrealEd, UnrealScript, and other aspects of Unreal Engine design.

    Post your fan fiction fan art threads here.

    For discussion and promotion of Unreal Engine single-player campaigns, mapping projects and total conversions.

    This forum is temporary and will be replaced by a new system.

    For the discussion of projects currently in development. Read the instructions on how to make your project eligible.

    For discussion of anything relating to multiplayer gameplay in the Unreal series, including co-op.

    For random rambling. Please keep your posts tasteful and respectful.

    Public forum for discussion of kea et al’s SP2D project.

    For public discussion of all things EXU2.

    Each week a single map is discussed here in detail.

    Content from deprecated forums can be found here.

    It may not be possible to post in some sub-forums.

    Who is online

    In total there are 32 users online :: 0 registered, 3 hidden and 29 guests (based on users active over the past 5 minutes)

    Most users ever online was 195 on 14 Sep 2016, 11:07


    23/09/2017

    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    What disk image should I use with VirtualBox, VDI, VMDK, VHD


    #

    Latest versions of VirtualBox supports several formats for virtual disks, but they forgot to provide a comparison between them.

    Now, I am interested about a recommendation or comparison that considers the following:

    • be able to use dynamic sizing
    • be able to have snapshots
    • be able to move my virtual machine to another OS or even another free virtualization solution with minimal effort (probably something that would run fine on Ubuntu).
    • performance

    asked Nov 23 ’11 at 0:28

    VirtualBox has full support for VDI. VMDK. and VHD and support for Parallels Version 2 (HDD) (not newer versions) .

    Answering Your Considerations

    • be able to use dynamic sizing

    VDI. VMDK. and VHD all support dynamically allocated sizing. VMDK has an additional capability of splitting the storage file into files less than 2 GB each, which is useful if your file system has a small file size limit.

    • be able to have snapshots

    All four formats support snapshots on VirtualBox.

    • be able to move my virtual machine to another OS or even another free virtualization solution with minimal effort (probably something that would run fine on Ubuntu).

    VDI is the native format of VirtualBox. I didn’t search for any other software that supports this format.

    VMDK is developed by and for VMWare, but Sun xVM, QEMU, VirtualBox, SUSE Studio, and .NET DiscUtils also support it. (This format might be the most apt for you because you want virtualization software that would run fine on Ubuntu. )

    VHD is the native format of Microsoft Virtual PC. This is a format that is popular with Microsoft products.

    I don’t know anything about HDD. Judging from looking at this site. Parallels is a Mac OS X product and probably isn’t suitable for you, especially considering that VirtualBox only supports an old version of the HDD format.

    The format should not affect performance, or at least, performance impacts are negligible.

    The factors that influence performance are:

    • your physical device limitations (much more noticeable on a hard disk drive than a solid-state drive. Why? )
    • expanding a dynamically allocated virtual disk drive (write operations are slower as the virtual disk expands, but once it’s large enough, expanding should happen less)
    • virtualization technology (hardware vs. software ; hardware virtualization helps VirtualBox and improves the speed of virtual operating systems)
    • the fact that you are running a virtual operating system. Performance is always slower than running an operating system on the host because of the virtualization process.

    answered Jun 22 ’12 at 20:33

    I always use VDI, as it is the native format of VirtualBox; however, using a VMDK (VMWare format) will increase compatibility with other virtual machine software.

    VirtualBox will run fine on Ubuntu, so if the goal is Windows/Ubuntu interoperability, VDI would be a perfectly valid choice.

    Both formats will fulfill your requirements.

    As for the other two, VHD is a Microsoft-developed format, and HDD is an Apple-developed format; these are both proprietarily-licensed, so limit cross-platform support; I wouldn’t recommend them.

    Mpack, explains a key performance difference between VHD and VDI here:

    Having recently studied the VHD format, I would expect there to be at least a small difference in VDIs favor, most noticeable when you are comparing like with like, i.e. an optimized VDI vs optimized VHD. The reason is that the dynamic VHD format has these “bitmap” sectors scattered throughout the disk. Every time you modify a sector inside a block these bitmap blocks may need to be updated and written too, involving extra seeks, reads and writes. These bitmap sectors also have to be skipped over when reading consecutive clusters from a drive image – more seeks. The VDI format doesn’t have these overheads, especially if the VDI has been optimized (blocks on the virtual disk sorted into LBA order).

    All of my comments apply to the dynamic VHD format vs dynamic VDI. Performance tests on fixed sized virtual disks is pointless since both formats are then the same (just a plain image of a disk), they just have different headers on them.

    answered May 8 ’14 at 14:20

    I don’t know if using vmdk would enable you to transparently run a virtual machine created in VirtualBox in VMware or not. It might. However a more universal option might be to use the VirtualBox File/Export function to create an “Open Virtualization Appliance” .ova file that can then be imported into VMware. With that approach, you can port to any virtualization system that supports .ova without caring what disk image format you use in VirtualBox.

    If you need to export from the same VM at regular intervals, e.g. every day, that could be a pain. But if you only move to a different technology occasionally, it should be fine.

    If you have a .vdi file already, You can test whether this works without having to create a new virtual machine. Export it to a .ova, then try importing with vmware.

    answered Jul 3 ’12 at 21:22

    A good reason for me for using vmdk is that Virtualbox (at least until v4.1) using VDI format has the tendency, over time, to fill the complete allocated disk space, even though the internal virtual disk usage is still much less. With Virtualbox using vmdk disks, this seems less of a problem.

    But I’m talking years uptime. This might not be a problem many people encounter.

    answered Jan 30 ’15 at 15:13

    It s more related to the fragmentation of the guest file system than to the format itself. Enzo Jun 3 ’16 at 15:19

    It depends on how you plan to use virtual disk as well. Not every VM wants a single partition on a single disk.

    VDI seems to have more options (when used with VirtualBox), but as soon as you take VirtualBox out of the picture, support for VDI becomes somewhat shaky (as of late 2014).

    For instance my solutions need to have maximum cross-platform support. Mounting a VDI (such as a loopback device) on linux or Windows 7 is harder and buggier than you might expect. Almost like the VDI has too many features, making it difficult to make fully conforming utilities that can operate on it.

    VMDK is just less painless IMHO when you want it to work with any VM on any workstation, when you want to clone it 3 times to other systems on the network at the same time, and when you want to pry it open without launching a VM instance.

    Even though I use VirtualBox 90% of the time, those few times when my disks become unaccessable in certain workflows have led me to favor VMDK for pluggable/shared filesystems.

    answered Jan 8 ’15 at 4:33

    Disk image files reside on the host system and are seen by the guest systems as hard disks of a certain geometry. When a guest operating system reads from or writes to a hard disk, VirtualBox redirects the request to the image file.

    Like a physical disk, a virtual disk has a size (capacity), which must be specified when the image file is created. As opposed to a physical disk however, VirtualBox allows you to expand an image file after creation, even if it has data already; VirtualBox supports four variants of disk image files:

    VDI: Normally, VirtualBox uses its own container format for guest hard disks — Virtual Disk Image (VDI) files. In particular, this format will be used when you create a new virtual machine with a new disk.

    VMDK:VirtualBox also fully supports the popular and open VMDK container format that is used by many other virtualization products, in particular, by VMware.[25]

    VHD:VirtualBox also fully supports the VHD format used by Microsoft.

    Image files of Parallels version 2 (HDD format) are also supported.[26] For lack of documentation of the format, newer formats (3 and 4) are not supported. You can however convert such image files to version 2 format using tools provided by Parallels.

    answered Nov 28 ’15 at 18:23

    Looks like using VDI makes possible to trim disk file to its actual size VirtualBox and SSD s TRIM command support

    answered Nov 19 ’16 at 0:23

    While accurate it s a bit lackluster for a question that asks about the general differences between those formats, don t you think? Seth Nov 21 ’16 at 11:02


    13/09/2017

    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    Using MERGE in SQL Server to insert, update and delete at


    #

    Using MERGE in SQL Server to insert, update and delete at the same time

    By: Arshad Ali | Read Comments (34) | Related Tips: 1 | 2 | 3 | 4 | 5 | 6 | More > T-SQL
    Problem

    In a typical data warehousing application, quite often during the ETL cycle you need to perform INSERT, UPDATE and DELETE operations on a TARGET table by matching the records from the SOURCE table. For example, a products dimension table has information about the products; you need to sync-up this table with the latest information about the products from the source table. You would need to write separate INSERT, UPDATE and DELETE statements to refresh the target table with an updated product list or do lookups. Though it seems to be straight forward at first glance, but it becomes cumbersome when you have do it very often or on multiple tables, even the performance degrades significantly with this approach.� In this tip we will walk through how to use the MERGE statement and do this in one pass.

    Solution

    Beginning with SQL Server 2008, now you can use MERGE SQL command to perform these operations in a single statement. This new command is similar to the UPSERT (fusion of the words UPDATE and INSERT.) command of Oracle; it inserts rows that don’t exist and updates the rows that do exist. With the introduction of the MERGE SQL command, developers can more effectively handle common data warehousing scenarios, like checking whether a row exists, and then executing an insert or update or delete.

    The MERGE statement basically merges data from a source result set to a target table based on a condition that you specify and if the data from the source already exists in the target or not. The new SQL command combines the sequence of conditional INSERT, UPDATE and DELETE commands in a single atomic statement, depending on the existence of a record. The new MERGE SQL command looks like as below:

    The MERGE statement basically works as separate insert, update, and delete statements all within the same statement. You specify a “Source” record set and a “Target” table, and the join between the two. You then specify the type of data modification that is to occur when the records between the two data are matched or are not matched. MERGE is very useful, especially when it comes to loading data warehouse tables, which can be very large and require specific actions to be taken when rows are or are not present.

    Putting it all together

    In this example I will take a Products table as target table and UpdatedProducts as a source table containing updated list of products. I will then use the MERGE SQL command to synchronize the target table with the source table.

    First Let’s create a target table and a source table and populate some data to these tables.

    MERGE SQL statement – Part 1

    Hi, thank you so much this is a very nice article because i was facing a problm how to differentiate wich row is updated in final target table and i got an idea by reading your article so i declared Modified_date in target table and in mathed condition i checked if any row values is updated at the time modified_date will change and easy to identify in final result.

    Friday, February 20, 2015 – 6:54:03 AM – Shmuel Milavski

    This was very helpfull to me ,

    Monday, February 09, 2015 – 11:24:58 AM – Paul

    Is there a way to show only the items that are not matched in the target table from the source table? I run the below script in sql 2008 and get the following which is great but I want to be able to see which record did not match in the source table so I don’t have to go through 120 lines of data manually. The only table and row I am interested in is “stgitem.avgunitcost” which is the source table

    use test
    truncate table dbo.stgitem

    BULK
    insert dbo.stgitem
    FROM ‘C:\PriceUpdate\priceupdate.csv’
    WITH
    (
    KEEPIDENTITY,
    FIELDTERMINATOR = ‘,’,
    ROWTERMINATOR = ‘\n’
    )

    use test
    merge dbo.item
    using dbo.stgitem
    on item.code = stgitem.code
    when matched then
    update
    set item.avgunitcost = stgitem.avgunitcost,item.issuecost = stgitem.issuecost;

    (120 row (s) affected)

    (1 row (s) affected)

    (1 row (s) affected)

    (119 row (s) affected)

    Friday, November 21, 2014 – 1:58:45 PM – Kimberly Ford

    This was a fabulous article. I needed to share a few tables from my data warehouse with another team but didn’t want to give them access to the entire database. So, I create another database with just the tables I needed, used PART 2 and I have a fantastic method of keeping the tables in the “off database” updated! Now to just create my stored procedure and I’m set. Definitely a huge help.

    Friday, November 07, 2014 – 4:05:03 PM – ola

    Nice Article Ashad,

    Am currently imploring the merge function in my code, and for some reason, the matched rows are not updated in the target table when the update was done, only the Not matched rows that got inserted into the target table.

    Any suggestions please.

    Monday, November 03, 2014 – 12:56:05 PM – Tejas

    Nice article – very good example.

    In your example above, when row does not exist in Source (WHEN NOT MATCHED BY SOURCE ) You are deleting the row from Target table.

    In my case, I just want to update a flag on target that the row was marked as deleted (in Source).

    SQL 2008R2 wont allow this:

    WHEN NOT MATCHED BY SOURCE THEN Update Target.Action_Flag = ‘DELETED’


    13/09/2017

    Posted In: NEWS

    Tags: , , , ,

    Leave a Comment

    Connecting to the Amazon SES SMTP Endpoint – Amazon Simple Email


    #

    Connecting to the Amazon SES SMTP Endpoint

    The following table shows the Amazon SES SMTP endpoints for the regions in which Amazon SES is available.

    US East (N. Virginia)

    The Amazon SES SMTP endpoint requires that all connections be encrypted using Transport Layer Security (TLS). (Note that TLS is often referred to by the name of its predecessor protocol, SSL.) Amazon SES supports two mechanisms for establishing a TLS-encrypted connection: STARTTLS and TLS Wrapper. Check the documentation for your software to determine whether it supports STARTTLS, TLS Wrapper, or both.

    If your software does not support STARTTLS or TLS Wrapper, you can use the open source stunnel program to set up an encrypted connection (called a “secure tunnel”), then use the secure tunnel to connect to the Amazon SES SMTP endpoint.

    Amazon Elastic Compute Cloud (Amazon EC2) throttles email traffic over port 25 by default. To avoid timeouts when sending email through the SMTP endpoint from EC2, use a different port (587 or 2587) or fill out a Request to Remove Email Sending Limitations to remove the throttle.

    STARTTLS

    STARTTLS is a means of upgrading an unencrypted connection to an encrypted connection. There are versions of STARTTLS for a variety of protocols; the SMTP version is defined in RFC 3207.

    To set up a STARTTLS connection, the SMTP client connects to the Amazon SES SMTP endpoint on port 25, 587, or 2587, issues an EHLO command, and waits for the server to announce that it supports the STARTTLS SMTP extension. The client then issues the STARTTLS command, initiating TLS negotiation. When negotiation is complete, the client issues an EHLO command over the new encrypted connection, and the SMTP session proceeds normally.

    TLS Wrapper

    TLS Wrapper (also known as SMTPS or the Handshake Protocol) is a means of initiating an encrypted connection without first establishing an unencrypted connection. With TLS Wrapper, the Amazon SES SMTP endpoint does not perform TLS negotiation: it is the client’s responsibility to connect to the endpoint using TLS, and to continue using TLS for the entire conversation. TLS Wrapper is an older protocol, but many clients still support it.

    To set up a TLS Wrapper connection, the SMTP client connects to the Amazon SES SMTP endpoint on port 465 or 2465. The server presents its certificate, the client issues an EHLO command, and the SMTP session proceeds normally.

    Secure Tunnel

    If your software does not support STARTTLS or TLS Wrapper, you can set up a secure tunnel to allow your software to communicate with the Amazon SES SMTP endpoint. As this option is most commonly used by mail server administrators, details are given under Integrating Amazon SES with Your Existing Email Server.


    12/09/2017

    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    Linfo – Shows Linux Server Health Status in Real-Time #check #linux


    #

    Linfo Shows Linux Server Health Status in Real-Time

    Linfo is a free and open source, cross-platform server statistics UI/library which displays a great deal of system information. It is extensible, easy-to-use (via composer) PHP5 library to get extensive system statistics programmatically from your PHP application. It’s a Ncurses CLI view of Web UI, which works in Linux, Windows, *BSD, Darwin/Mac OSX, Solaris, and Minix.

    It displays system info including CPU type/speed ; architecture, mount point usage, hard/optical/flash drives, hardware devices, network devices and stats, uptime/date booted, hostname, memory usage (RAM and swap, if possible), temperatures/voltages/fan speeds and RAID arrays.

    Requirements:

    • PHP 5.3
    • pcre extension
    • Linux /proc and /sys mounted and readable by PHP and Tested with the 2.6.x/3.x kernels

    How to Install Linfo Server Stats UI/library in Linux

    First, create a Linfo directory in your Apache or Nginx web root directory, then clone and move repository files into /var/www/html/linfo using the rsync command as shown below:

    Then rename sample.config.inc.php to config.inc.php. This is the Linfo config file, you can define your own values in it:

    Now open the URL http://SERVER_IP/linfo in web browser to see the Web UI as shown in the screenshots below.

    This screenshot shows the Linfo Web UI displaying core system info, hardware components, RAM stats, network devices, drives and file system mount points.

    Linux Server Health Information

    You can add the line below in the config file config.inc.php to yield useful error messages for troubleshooting purposes:

    Running Linfo in Ncurses Mode

    Linfo has a simple ncurses-based interface, which rely on php s ncurses extension.

    Now compile the php extension as follows

    Next, if you successfully compiled and installed the php extension, run the commands below.

    Verify the ncurses.

    Linux Server Information

    The following features yet to be added in Linfo:

    1. Support for more Unix operating systems (such as Hurd, IRIX, AIX, HP UX, etc)
    2. Support for less known operating systems: Haiku/BeOS
    3. Extra superfluous features/extensions
    4. Support for htop-like features in ncurses mode

    For more information, visit Linfo Github repository: https://github.com/jrgp/linfo

    That’s all! From now on, you can view a Linux system’s information from within a web browser using Linfo. Try it out and share with us your thoughts in the comments. Additionally, have you come across any similar useful tools/libraries? If yes, then give us some info about them as well.


    10/09/2017

    Posted In: NEWS

    Tags: , , , , , , ,

    Leave a Comment

    D-Link Products – DNS-320-110 – 1TB ShareCenter – 2-Bay Network Storage,


    #

    1TB ShareCenter 2-Bay Network Storage, SATA, RAID 0/1, JBOD, USB Print Server

    This ShareCenter storage device comes with a 1TB hard drive so everyone on your network can back up and share their documents, music, photos, videos to a central location and access them remotely over the Internet right out of the box. Plus, it features a built-in Web File and FTP server so you can remotely access your files over the Internet.

    Features:

    • The cost-effective way to store and share your documents, music, videos, and photos with anyone on your network
    • Ideal backup solution for households with more than 1 computer – no need to physically connect a USB drive to each computer to perform scheduled backups.
    • Included backup software allows users to protect important files by scheduling automatic backups on set timeline.
    • Share a USB printer over the network between all the computers in your house
    • Built-in Web File server and FTP server to access digital files remotely over the Internet
    • 2-bay device with 1x1TB SATA disk drive pre-installed and pre-formatted for plug ‘n go installation – for additional capacity, insert a second 3.5 SATA disk drive without any tools or attaching any cables
    • Connect to the network with a Gigabit port for fast transfer speeds
    • Support for RAID 1 (mirroring) to protect against data loss in the event of a disk drive failure
    • Easy management with user-friendly web-based GUI.
    • Complementary solution with other D-Link digital home products:
      • store and stream media content from your ShareCenter to your TV using your Boxee Box
      • store IP video to your ShareCenter as part of your home monitoring solution

    Raid 1 Technology

    RAID 1 is like a backup for your backup. It causes the drives in your storage device to mirror each other, so if one drive fails the unaffected drive will continue to function until the failed one is replaced.

    Web File Server and FTP Server

    The DNS-320 includes a built-in Web File server and FTP server to make accessing files remotely, over the Internet, a breeze. The FTP server will come in handy when you need to share a file too big to e-mail to a friend.

    This ShareCenter device has a built-in media server that can stream your photos, music and videos to all of the computers in your home and to compatible media players like Boxee Box, Xbox and PlayStation 3 so you can enjoy it all on your TV.

    10/100/1000 Gigabit Port

    The 10/100/1000 Gigabit Ethernet port gives you blazing fast speeds so you can back up and access your data without the wait.

    There s no overheating in this device s future. It comes with a quiet, built-in cooling fan that only comes on when needed, saving you power and money.

    D-Link Easy Search Utility

    The D-Link Easy Search Utility allows you to locate your ShareCenter from anywhere on the network and map your network drive so it will conveniently appear in My Computer on your PC.

    The included feature-rich backup software allows you to create schedules and rules including full or incremental backups.

    Not quite the handyman? That s ok. You can insert an additional hard drive without using any tools or attaching any cables.

    This product allows hard drives to enter sleep mode when not in use to conserve electricity and prolong the life of the hard disk. Plus, it uses recyclable packaging and complies with the European Union s RoHS directive.

    USB Print Server Port

    This storage device can also serve as a USB print server, allowing you to share a single USB printer over your network. The USB port can also support a Universal Power Supply (UPS) monitor that supports smart signaling over a USB connection. If a power outage were to occur, the compatible UPS monitor would allow the UPS unit to safely shut down the ShareCenter.

    AjaXplorer is a file explorer that allows you to remotely manage your files using a web browser. Stay protected – anywhere, anytime.

    Not to worry, Mac users! ShareCenter can back up your data regardless of your computer’s operating system (Windows, Mac or Linux)

    • CPU
    • 800 MHz
    • 128MB RAM
    • Standards
    • IEEE 802.3 10Base-T Ethernet
    • IEEE 802.3u 100Base-TX Fast Ethernet
    • IEEE 802.3ab 1000Base-T Gigabit Ethernet
    • Support Hard Drive Type
    • 3.5 Internal SATA Hard Drive
    • Ports
    • 1 x 10/100/1000 Gigabit Ethernet
    • 1 USB Port
    • Power
    • Drive Management
    • Four Different Hard Drive Configurations (RAID 0, 1, JBOD, Standard)
    • Drive Status with E-mail Alerts
    • Drive Quotas
    • Power Management
    • Device Management
    • Internet Explorer v6 or other Java-enabled Browsers
    • LEDs
    • Power
    • LAN
    • HDD 1
    • HDD 2
    • Certifications
    • FCC Class B
    • CE
    • Power Supply
    • External Power Supply
    • DC 12V / 4A Switching
    • Power Consumption
    • Normal Mode: 15.7 W
    • Sleep Mode: 8.2 W
    • Power Management
    • Power Saving
    • Schedule Power Off
    • Auto Power Recovery Support
    • Operating Temperature
    • 30 to 104 F (0 to 40 C)
    • Operating Humidity
    • 10% to 95% Non-Condensing
    • Dimensions (W x D x H)
    • Item: 4.5 x 6.9 x 5.8 (115mm x 175mm x 149mm)
    • Packaging: 8.14 x 11.18 x 7.48 (206.76mm x 283.97mm x 189.99mm)
    • Weight
    • 3.37lbs
    • Warranty
    • 3 Year Limited*
    • Minimum System Requirements
    • Computer with:
    • 1GHz Processor
      512MB RAM
      200MB of Available Hard Disk Space
      Windows 7, Windows Vista or Windows XP SP2**
      CD-ROM Drive to View Product Documentation and Install Software
    • Package Contents
    • ShareCenter 2-Bay Network Storage with USB Printer Port
    • 1 x 1TB SATA hard drive
    • Power Adapter
    • Ethernet Cable
    • Quick Installation Guide
    • CD ROM with:
    • Installation Wizard
      Product Documentation

    Hard drive(s) not included with DNS-320 model. DNS-320-110 includes 1 x 1TB SATA drive. An internal 3.5 SATA drive is required to store or share files and must be formatted before use. RAID 0 and RAID 1 require the use of two (2) SATA drives. To avoid drive incompatibility in RAID 0 or RAID 1 operation, use SATA drives from the same manufacturer. Formatted drive capacity for RAID 1 operation is dependent on the drive capacity of the lower-sized drive. May not work with older generation SATA drives. For a list of SATA drives that have been tested to work with the DNS-320 visit the FAQs section.

    Use of an FTP Server over the Internet does not provide secure or encrypted transmissions, unless the end user enables SSL authentication in their FTP client.

    D-Link cannot guarantee full compatibility or proper playback with all codecs. Playback capability depends on the codec support of the UPnP AV media player.

    24/7 Basic Installation Support is available only in the USA for the first 30 days from date of original purchase.

    D-Link makes no warranty as to the availability, reliability, functionality, and operation of the iTunes Server feature.

    *3-Year Limited Warranty available only in the USA and Canada.

    **Computer must adhere to Microsoft’s recommended System Requirements.

    All references to speed and range are for comparison purposes only. Product specifications, size, and shape are subject to change without notice, and actual product appearance may differ from that depicted on the package. See inside package for warranty details.


    10/09/2017

    Posted In: NEWS

    Tags: , , , , , , , , , , , , ,

    Leave a Comment

    Monitoring Exchange 2013 with SCOM 2012 (Part 2) #exchange #server #monitoring


    #

    Monitoring Exchange 2013 with SCOM 2012 (Part 2)

    Table 1: List of servers

    Exchange 2013 Management Pack Pre-requisites and Considerations

    Before importing the Exchange 2013 MP into System Center Operations Manager, there are some pre-requisites that have to be met:

    You have one of the following versions of System Center Operations Manager deployed in your organization:

    • System Center Operations Manager 2012 RTM or later
    • System Center Operations Manager 2007 R2 or later
  • You have already deployed SCOM agents to your Exchange Servers.

    The SCOM agents on your Exchange Servers are running under the local system account.

    The SCOM agents on your Exchange Servers are configured to act as a proxy and discover managed objects on other computers.

    If you are monitoring Exchange Server 2013 Database Availability Groups (DAGs), ensure that all DAG members are monitored by Operations Manager.

    Before downloading and installing the Exchange Server 2013 MP, you might want to import some recommended additional management packs, such as (these are the ones I used):

    Add the Exchange servers as agent managed computers

    Adding the Exchange servers to monitor as agent managed computers is the first required step.

    1. Click the Administration tab and then click Configure computers and devices to manage on the Actions pane. This will start the Computer and Device Management Wizard (Figure 2). Click Next. choose Advanced Discovery (Figure 3) and select Servers Only from the Computers and Device Classes drop-down box.
    1. On the next window, browse for the computers you are adding (Figure 4) and click Next. Select Use selected Management Server Action Account (Figure 5), click Discover and wait for the discovery results (Figure 6). Figure 7 shows a brief summary that is displayed at the end of the wizard. It is mandatory that all systems running Exchange Server 2013 that are managed by Operations Manager use Local System as the Agent Action Account. Click Finish .
    1. If the agent installation was successful, on each Exchange server you ll be able to see the System Center 2012 Operations Manager Agent listed on the Programs and Features on Windows 2012 (Figure 8). A new service is also created, the System Center Management Service. as depicted in Figure 9.
    1. To enable Agent Proxy configuration on all managed Exchange servers, in the Administration pane, under Administration. Device Management. Agent Managed. right-click on each Exchange server (Figure 10), select Properties. then the Security tab (Figure 11), and check the box Allow this agent to act as a proxy and discover managed objects on other computers. This step will also make exchange cluster instances to appear in the Agentless Managed section (ensure that all physical nodes of the cluster are monitored). Repeat the process for every managed Exchange 2013 server in the list

    Create a new management pack for customizations

    The customizations and overrides of sealed management packs, such as the Exchange 2013 MP, are usually saved in the default management pack. As a best practice you should create and use an unsealed management pack for each sealed management pack that you want to override, as shown in Figure 12.

    Figure 12: Unsealed management packs

    Creating a new management pack for storing overrides has the following advantages:

    • It simplifies the process of exporting customizations that were created in your test and pre-production environments to your production environment.
    • It allows you to delete the original management pack without first needing to delete the default management pack.
    • It is easier to track and update customizations to individual management packs.
    1. In the Operations Console, click the Administration button. In the Administration pane, right-click Management Packs and then click Create Management Pack. The Create a Management Pack wizard displays.
    2. In the General Properties page (Figure 13), type a name for the management pack in Name. the correct version number in Version. and a short description in Description. Click Next and then Create .

    Install the Exchange Server 2013 MP

    With the recommended additional management packs already imported, download and install the latest Microsoft Exchange Server 2013 Management Pack (at the time of the writing of this article it was version 15.00.0620.018). You can find the latest Management Packs at the Microsoft System Center Marketplace .

    Let s look at the installation steps of the Exchange 2013 Management Pack:

    1. Download the management pack file and launch the Microsoft Installer (MSI) package on the selected SCOM server. Accept the license agreement, and click Next (Figure 14).
    1. Accept the default installation folder or select a new one. Click Next (Figure 15). The extraction process begins.
    1. When the extraction ends, click Close (Figure 16). When the installation is complete, the management pack files are copied to the System Center Management Packs folder.
    1. To import the Exchange 2013 MP, open the SCOM 2012 Operations Console. Click the Administration tab, right-click the Management Packs node and then click Import Management Packs (Figure 17).
    2. Click Add. Add from disk and then click No on the Online Catalog Connection window. Select all the files from the Exchange MP directory, by default C:\Program Files\System Center Management Packs (Figure 18), click Open and then click the Install button (Figure 19).
    1. The Import Management Packs page appears and shows the progress for each management pack. After the import process is complete and the dialog box displays an icon next to each Management Pack that indicates success of the importation (Figure 20), click the Close button. Click View and then Refresh. or press F5, to see the Microsoft Exchange Server 2013 management pack in the list of Management Packs.

    After importing the Exchange 2013 MP, it will start immediately discovering Exchange machines. So, if you browse to the Discovered Inventory pane on the Operations Console (Figure 21), all the Exchange 2013 servers should be listed. Notice that the Database Availability Group (DAG) is also listed, although its state is Not monitored. This is a normal behavior, since the physical nodes of the DAG are already being monitored.

    The Exchange 2013 MP adds 3 views to the Monitoring pane (Figure 22):

    • Active Alerts
    • Organization Health
    • Server Health

    Expand Microsoft Exchange Server 2013. and then click Server Health. Right click on one of the Exchange servers listed and click Open. Health Explorer. By default, the view is scoped to unhealthy child monitors (Figure 23). Click on Filter Monitors to clear the filter (Figure 24). Expand Entity Health to view the 4 health groups for Exchange Server 2013:

    • Customer Touch Points components with direct real-time, customer interactions (e.g. OWA).
    • Service Components components without direct, real-time, customer interaction (e.g. OAB generation).
    • Server Components physical resources of a server (e.g. disk, memory).
    • Key Dependencies server s ability to call out to dependencies (e.g. Active Directory).

    Summary

    With the Exchange 2013 Management Pack imported, SCOM is now prepared to receive the escalated alerts from Managed Availability that require human attention.

    In the next part we ll take a deeper look into Managed Availability, specifically how to interact with it and perform some configuration tasks that used to be part of the process of installing and configuring the MP.

    If you would like to read the other parts in this article series please go to:


    09/09/2017

    Posted In: NEWS

    Tags: , ,

    Leave a Comment

  • Linux – Windows Fully Dedicated Servers #dedicated #servers, #server, #servers, #managed


    #

    We offer Linux-based operating systems including Debian (our recommendation), Ubuntu, and CentOS at no extra charge.

    We also offer a choice of Microsoft Windows 2008 Server R2 Editions (Web, Standard and Enterprise), which cost from an additional /month.

    If you do not want to administer the server manually then we strongly recommend a control panel to allow you to administer the server and setup Web sites / email accounts via a Web-based interface. Our recommended control panel is cPanel/WHM. which costs an extra 25.00/month. We offer Fantastico for a further 15.00/month on our dedicated servers.

    We provide a free Magento (e-commerce solution) installer tool with cPanel/WHM. If you would like more information or advice on Magento hosting please contact us .

    We do not currently offer any control panel solutions for Windows, and do not recommend it for simple Web email hosting requirements.


    09/09/2017

    Posted In: NEWS

    Tags: , , , , , , , , , , , , , , , , , ,

    Leave a Comment

    MobaXterm Xserver with SSH, telnet, RDP, VNC and X11 #x #server,


    #

    In order to install these plugins, just download them and put them in the same directory than MobaXterm executable.
    If you need to enhance MobaXterm with extra tools and commands, you can also use the MobApt package manager. type MobApt (or apt-get ) inside MobaXterm terminal.

    CygUtils.plugin. Collection of core UNIX tools for Windows

    Corkscrew. Corkscrew allows to tunnel TCP connections through HTTP proxies

    Curl. Curl is a command line tool for transferring data with URL syntax

    CvsClient. A command line tool to access CVS repositories

    Gcc, G++ and development tools. the GNU C/C++ compiler and other development tools

    DnsUtils. This plugin includes some useful utilities for host name resolution: dig, host, nslookup and nsupdate.

    E2fsProgs. Utilities for creating, fixing, configuring, and debugging ext2/3/4 filesystems.

    Emacs. The extensible, customizable, self-documenting real-time display editor

    Exif. Command-line utility to show EXIF information hidden in JPEG files.

    FVWM2. A light but powerful window manager for X11.

    File. Determines file type using magic numbers.

    Fontforge. A complete font editor with many features

    GFortran. The GNU Fortran compiler.

    Git. A fast and powerful version control system.

    Gvim. The Vim editor with a GTK interface

    Httperf. A tool for measuring web server performance.

    Joe. Fast and simple editor which emulates 5 other editors.

    Lftp. Sophisticated file transfer program and ftp/http/bittorrent client.

    Lrzsz. Unix communication package providing the XMODEM, YMODEM ZMODEM file transfer protocols.

    Lynx. A text-mode web browser.

    MPlayer. The ultimate video player

    Midnight Commander. Midnight Commander is a feature rich text mode visual file manager.

    Mosh. MOSH has been included into MobaXterm main executable in version 7.1 directly in the sessions manager. This plugin is deprecated.

    Multitail. Program for monitoring multiple log files, in the fashion of the original tail program.

    NEdit. NEdit is a multi-purpose text editor for the X Window System.

    Node.js. Node.js is a platform built on Chrome’s JavaScript runtime for easily building fast, scalable network applications. This plugin does not include NPM.

    OpenSSL. A toolkit implementing SSL v2/v3 and TLS protocols.

    PdKsh. A KSH shell open-source implementation.

    Perl. Larry Wall’s Practical Extracting and Report Language

    Png2Ico. Png2Ico Converts PNG files to Windows icon resource files.

    Python. An interpreted, interactive object-oriented programming language.

    Ruby. Interpreted object-oriented scripting language.

    Screen. Screen is a terminal multiplexer and window manager that runs many separate ‘screens’ on a single physical character-based terminal.

    Sqlite3. Software library that implements a self-contained, serverless, zero-configuration, transactional SQL database engine.

    SquashFS. mksquashfs and unsquashfs tools allow you to create/unpack squashfs filesystems from Windows.

    Subversion (SVN). Subversion is a powerful version control system.

    Tcl / Tk / Expect. Tcl is a simple-to-learn yet very powerful language. Tk is its graphical toolkit. Expect is an automation tool for terminal.

    X11Fonts. Complete set of fonts for X11 server.

    X3270Suite. IBM 3270 terminal emulator for Windows.

    XServers. Xephyr, Xnest, Xdmx, Xvfb and Xfake alternate X11 servers.

    Xmllint. A command line XML tool.

    Zip. Zip compression utility.

    Snaphat also bundled some other plugins (Python, Cmake, Graphviz, Lua, Readline and CGDB) that you can download from his website .
    Rthomson also bundled a “Tmux” plugin that you can download from his website .

    Sources for each plugins are available here.
    Each license can be found in the corresponding source package.


    08/09/2017

    Posted In: NEWS

    Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

    Leave a Comment

    Server Monitoring Software (SaaS), Server Performance Monitoring Tools #saas #server #monitoring


    #

    Server monitoring software (SaaS) from Anturis

    Deploy Windows and Linux monitoring in minutes and scale with ease

    Robust, yet simple and affordable, Anturis hosted server monitoring software (SaaS) for both Windows and Linux allows you to:

    • Easily set up monitoring of critical server performance metrics, applications, and networks.
    • Receive alerts notifying you of incidents.
    • Analyze historical and real-time server statistics.
    • Get an eagle s-eye view of the health of your entire infrastructure.

    A server monitoring tool that works perfectly for both in-house and cloud servers

    Anturis provides server performance monitoring for them all – physical Windows and Linux in-house servers as well as AWS, Microsoft Azure, Rackspace, and DigitalOcean off in the cloud.

    Set up server health monitoring by simply running a single shell command or through a standard Windows installer wizard – either will automatically install the agent and configure a typical server monitoring setup. There is no need to configure a SNMP daemon or WMI service. All that is required is to run the agent on your servers.

    Track important server metrics with ease

    • Server performance monitoring. CPU usage, CPU load, RAM, disk space, disk usage, SMART attributes.
    • Applications monitoring. MySQL database, Apache server, log files, custom scripts, swap usage, OS processes, Windows services, Active Directory, JVM, Windows Event Logs.
    • External and internal monitoring via the following protocols. ICMP, TCP, SSH, FTP, SMTP/SMTPs, IMAP/IMAPs, POP3/POP3s, HTTP/HTTPs.
    • Network monitoring. Ping, SNMP devices, packet loss, jitter, latency, printer, network interfaces.

    Email, SMS, and voice call notifications

    Anturis server monitoring tool offers customizable email, SMS, and voice call alerts and employs techniques that help eliminate false alerts and alert spam (multiple alerts for the same problem).

    Alerting can be configured according to:

    • Problem/incident severity.
    • Components dependencies.
    • Monitor status-change rules.
    • Warning and error thresholds.
    • Staff members responsibilities.

    Infrastructure schema view with impact-dependencies modeling

    Anturis server monitoring software allows you to built dependency charts that show how network devices, databases, servers, and other components are related, and can include such information in alerts.

    The hierarchical arrangement helps to avoid notification spam (in case several components fail at the same time) and to get an eagle s-eye view of the health of your entire infrastructure.

    External monitoring from multiple geographic locations

    Today s global economy means that your network must be available globally. Anturis employs global coverage to ensure that your websites, applications, and services are available from diverse regions and countries. Our multiple global locations allow you not only to monitor your servers’ availability, but also to compare the response time and full-web-page load time from various locations. Anturis maintains locations in the U.S. Canada, South America, Western Europe, Russia, China, and Singapore.

    Complete network monitoring

    Your network consists of more than just your servers, and the Anturis monitoring tool covers a wide variety of other tasks, such as checking for open ports, confirming the status and connectivity of your printers, and monitoring the QoS of your VoIP system. Anturis monitors virtually all SNCP-enabled devices, such as routers and switches.

    Data presentation and reports

    Get the information you need to keep your entire network in top shape through network maps, charts, tables, and dashboards. Review daily, weekly, or monthly reports to analyze your servers performance and uptime metrics. You choose the timeframe and the format.

    Log In

    Failed to confirm the account

    Email confirmed

    Forgot Your Password?


    07/09/2017

    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    The best free parental control software 2017 #best #free #server #monitoring


    #

    TechRadar

    The best free parental control software 2017

    Keep your children safe online with the best free parental control software for Windows

    It’s hard to imagine anything less child-friendly than an uncensored internet. A rabid wolf, maybe, or a playground floored with broken glass and razor wire. The more connected we become the more we need everybody online – and that means trying to ensure that our children aren’t exposed to the very worst content, ideas and behaviour that exist online.

    Software can’t do everything, of course, but it can help to make parents’ lives much easier. These are our picks of the best parental control tools.

    1. Qustodio

    A full suite of parental control tools to protect kids from the worst of the web

    Most parental control software is aimed at Windows, but Qustodio (think ‘custodian’) is also available for Mac, Android. iOS, Kindle and (weirdly) Nook.

    The free version covers the basics, enabling you to set rules and time schedules, block pornography and other unsuitable content; if you go for the paid-for version that adds SMS monitoring, social media features and per-app controls. But even the free version is one of the most comprehensive parental control apps around.

    Its raft of features and support for a wide range of platforms make Qustodio the best free parental control software, but there are some other excellent free programs available, some of which may be better suited to your individual needs as a parent. Read on for our top choices.

    2. OpenDNS Family Shield

    Block domains on your whole home network at router level

    FamilyShield is a free service from OpenDNS. Its parental control tools automatically block domains that OpenDNS has flagged under the headings “tasteless, proxy/anonymizer, sexuality, or pornography”.

    One of the big pluses here is that while FamilyShield can run on PCs and mobile devices, you can also apply it to your network router and filter all the traffic that passes through it it’s just a matter of changing the DNS server numbers in your control panel.

    This has the happy benefit of improving DNS lookup speeds on some ISPs. By filtering everything at the router level, every device on your network benefits from the filters.

    3. Kidlogger

    Comprehensive activity logging so you know what your kids have been up to

    Nothing gets past Kidlogger. This free parental control software not only tracks what your children type and which websites they visit it also keeps a record of which programs they use and any screengrabs they take.

    If you’re concerned about who your kids might be talking to online, there’s even a voice-activated sound recorder. If your children are a little older and more responsible, you can pick and choose which options to monitor and give them a little privacy.

    The free software only covers one device and lacks some of the sneakier features of the premium editions (including silent monitoring of WhatsApp conversations and the ability to listen to phone calls), but it’s still a well-rounded tool if you’re concerned about your kids’ safety.

    4. Spyrix Free Keylogger

    Find out what the kids have been typing, and if they might be in trouble

    Keyloggers have something of a bad reputation online, as they’re often used by villains, but they can be a force for good too, and Spyrix ‘s features enable you to see what your children have been up to.

    Although it’s dubbed parental control software, it’s really a monitoring program; it doesn’t stop the kids getting up to no good, but it does let you see exactly what they’ve done.

    That means it isn’t really appropriate for younger children’s computers, but it may be useful for older children if you suspect online bullying or other unpleasantness.

    5. Zoodles

    A whole browser designed for younger kids, but quite easily circumvented

    The problem with many parental control apps is that they’re most effective for older children: while filtering adult content and other unpleasantness is obviously a good thing, there’s plenty of stuff that isn’t adult that can still scare younger children silly.

    Zoodles addresses that by combining filtered browsing and a dedicated web browser to create a walled garden: everything in it is safe for kids and there’s no risk of anything awful popping up.

    In addition to Windows, Zoodles is also available for Mac, Android and iOS, and a brand new version is currently in development.


    04/09/2017

    Posted In: NEWS

    Tags: , , , ,

    Leave a Comment

    Understanding GPO in Windows Server 2012 #server #2012, #group #policy, #windows


    #

    Understanding GPO in Windows Server 2012

    Group Policies are computer or user settings that can be defined to control or secure the Windows server and client infrastructure. Understanding GPO in Windows Server 2012 before actually configuring and applying policy settings is very important. It is easy to understand GPO in Windows Server 2012. There are some new features of GP O in Windows Server 2012 .

    Understanding GPO in Windows Server 2012

    Two main components of GPO are, GPO Object and GPO Policy Settings.

    GPO Object. GPO Object is an active directory object that has various group policy settings. These policy settings can be user settings or computer settings and can be applied to user or computers. GPO objects are stored in GPO container. The GPO object is stored in active directory database and each object has its own unique GUID (Globally Unique Identifier).

    GPO Policy Settings. GPO policy settings are the real settings within GPO object that defines particular action. GPO policy settings comes from GPO templates which are stored in SYSVOL folder of each domain controller. For example, Prohibit Access to Control Panel is a GPO policy setting that will simply disable access to control panel. Most of the GPO settings can be enabled, disabled or not configured. The example is shown below,

    When you create a group policy, the GPO object is created and stored in GPO container in active directory and at the same time, GPO template is created and stored in SYSVOL folder. After creating a group policy, it can be linked to Sites, Domains and OUs. Group policy is process in the order of LSDOU.

    1. Local Group Policy
    2. Sites
    3. Domains
    4. Organizational OUs

    There are certain things that you should remember while creating and applying GPO settings. As stated earlier there are computer settings and user settings of each GPO object. Computer settings are applied at startup of the client machine. User settings are applied at use logon. Policies refresh can be initiated manually by using, C:\ gpupdate /force command or C:\ Invoke-Gpupdate powerShell cmdlet.

    In fresh domain controller there are two default group policy settings configured. They are:

    1. Default Domain Policy. This policy is linked to the entire domain and has policies like password policies, account lockout policies and kerberos protocol policies. It is recommended that not to edit this policy. If you want to link new group policy then create new GPO and link to the domain.
    2. Default Domain Controller Policy. This policy setting is applied to domain controllers and is linked to domain controllers OU. This policy affects domain controllers only.

    You may also like –

    • Understanding Logical Structure of Active Directory
    • Install Domain Controller in Windows Server 2012
    • Install Remote Desktop Services in Windows Server 2012
    • Create User Account in Server 2012 Domain Controller
    • Configure Shadow Copy of Shared Folder in Server 2012
    • Configure FTP Server in Windows Server 2012
    • Script to Create AD User Accounts from MS Access File

    01/09/2017

    Posted In: NEWS

    Tags: , , , ,

    Leave a Comment

    HP ProLiant ML110 G7 review #hp #proliant #server #ml


    #

    HP ProLiant ML110 G7 review

    Page 1 of 2 HP ProLiant ML110 G7 review

    The new ProLiant ML110 G7 is designed primarily for small businesses with limited on-site IT skills looking for their first server. It’s also the first HP product to sport Intel’s latest Xeon E3 processor. It goes head-to-head with Dell’s PowerEdge T110 II. also equipped with an Intel Xeon E3, which took over at the top of the A-List last month as our favourite pedestal server.

    Can this ProLiant topple the newly crowned Dell? It certainly makes a good start. The HP scores higher for remote server management, since it features an ML110 embedded iLO3 controller. This is the same controller that’s found in all the high-end ProLiant servers, first appearing in the ProLiant DL380 G7 .

    The iLO3 shares access with the first of the server’s two Gigabit Ethernet ports, but you can buy an optional upgrade that adds a dedicated management port. These features make the ProLiant ML110 G7 well suited to remote sites or IT providers, since it can be accessed easily over the internet for full remote diagnostics and, with the optional upgrade, remote control.

    The ML110’s power options are also superior: either a fixed 350W supply or up to two 460W hot-plug supplies. The review system included a 460W hot-plug supply with a second module costing around £155 exc VAT extra. The server is easy on the power, too, with our inline power meter clocking the HP at only 35W with Windows Server 2008 R2 idling. With SiSoft Sandra fully exercising the eight logical cores of the Xeon E3 processor, this peaked at only 97W.

    HP is offering a host of processor options: along with Core i3, there’s a choice of five Xeon E3 models. The 3.3GHz Xeon E3-1240 in the review system sits in the middle of this group, but you can save cash and opt for the slightly slower 3.1GHz E3-1220. This is fitted in the base server model, which costs only £455 exc VAT.

    The HP’s storage is exemplary. A lockable front panel hides a hard disk cage with four removable drive carriers. In the base model the cage is wired directly to the embedded B110i SATA RAID controller, which supports stripes, mirrors and cold-swap drives. For hot-swap and SAS support you can specify an HP Smart Array RAID P212 or P410 PCI Express card. The latter has a pair of quad-port SAS connectors, and with this in place you can use the optional SFF bay that supports eight hot-swap 6Gbits/sec SAS, nearline SAS or SATA hard disks.

    Page 1 of 2 HP ProLiant ML110 G7 review


    31/08/2017

    Posted In: NEWS

    Tags: , , ,

    Leave a Comment

    Connecting to a Fax Server (Windows) #how #to #setup #a #fax


    #

    Connecting to a Fax Server

    In the Win32 Environment

    To establish the connection to the local fax server, a fax client application must call the FaxConnectFaxServer function successfully before it calls any other fax client function. FaxConnectFaxServer returns a fax server handle that is required to call many other fax client functions. The FaxConnectFaxServer function can only be used only with a local server.

    Note that a connection to a fax server is not required to print a fax document to a fax printer device context. An application can provide transmission information directly to the fax client Windows Graphics Device Interface (GDI) functions, and transmit the active document by printing it to a printer device context. The fax client GDI functions include the FaxStartPrintJob and the FaxPrintCoverPage functions. For more information, see Printing a Fax to a Device Context.

    Call the FaxClose function to disconnect from the fax server and deallocate the handle that the FaxConnectFaxServer function returns.

    In the COM Implementation Environment

    If you are writing a C/C++ application, you must call the CoCreateInstance function to retrieve a pointer to an IFaxServer interface and create an instance of a FaxServer object. Then you must call the IFaxServer::Connect method to initiate a connection with an active fax server. The server connection is required before the application can access most interfaces that begin with IFax. (A fax server connection is not required to access an IFaxTiff interface.) For more information about creating a FaxServer object, and for a list of properties and methods, see IFaxServer .

    If you are writing a Microsoft Visual Basic application, you must call the Visual Basic CreateObject function to create an instance of a FaxServer object. Then you must call the Connect method of the FaxServer object to initiate a connection with an active fax server. The server connection is required before the application can access most other objects that begin with Fax. (A fax server connection is not required to access a IFaxTiff object.) See FaxServer object (Visual Basic) for more information about the steps required to create the object, and for a list of properties and methods of the object.

    Related topics

    Build date: 5/5/2012


    29/08/2017

    Posted In: NEWS

    Tags: , , , , ,

    Leave a Comment

    Hotel Downtown Atlanta #atlanta #dedicated #server


    #

    Atlanta

    Cookie policy

    Four Seasons uses “cookies” to give you the best experience. Please refer to the section on cookies in our Privacy Policy here for a description of how we use cookies to enhance your experience on www.fourseasons.com. We have recently changed our policy on cookies. To find out more, click here. If you accept and want to continue your session with cookies please click Accept. You may follow this link to learn how to manage cookies through your web browser: http://www.aboutcookies.org/how-to-control-cookies/. By continuing to use this site without changing your settings you consent to our use of cookies in accordance with our Privacy Policy.

    Cookies on the Four Seasons Website

    Four Seasons uses “cookies” to give you the best experience. Please refer to the section on cookies in our Privacy Policy here for a description of how we use cookies to enhance your experience on www.fourseasons.com. We have recently changed our policy on cookies. To find out more, click here. If you accept and want to continue your session with cookies please click Accept. You may follow this link to learn how to manage cookies through your web browser: http://www.aboutcookies.org/how-to-control-cookies/. By continuing to use this site without changing your settings you consent to our use of cookies in accordance with our Privacy Policy.

    Cookie policy

    Four Seasons uses “cookies” to give you the best experience. By using this website, you consent to our use of these cookies. We have recently changed our policy on cookies. To find out more, click here .

    Cookies on the Four Seasons Website

    Four Seasons uses “cookies” to give you the best experience. By using this website, you consent to our use of these cookies. We have recently changed our policy on cookies. To find out more, click here .


    28/08/2017

    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    SOLUTION High Availability SQL Server Interview Question? #microsoft #sql #server, #microsoft


    #

    High Availability SQL Server Interview Question?

    That means an always on witness server that is talking to the same disks on a local SAN unit. You can’t really do that from a distance.

    Really Jimpen? I can’t believe you confidently posted this.
    First, by centralised storage, I meant a SAN, not a NAS.

    Secondly, anyone can implement geographical redundancy for both 1. servers and 2. the storage. as well long as there’s a high-speed fibre network to support this kind of implementation.

    How do you think organisations do carry on with business uninterrupted when there’s an entire site shutdown or an entire shutdown of one of their key datacentres?

    I will explain how to implement a two node HA solution using two sites over a GAN:
    One can implement HA across a metropolitan area network with two SAN site replicated across the two sites over a high-speed fibre connectivity.

    We’ve done this using both EVA NetApp. What’s key is implementing storage replication across the two sites. With NetApp, you can use snap-mirroring.
    You need two SAN directors, one at each geographically separated site and this is where you will connect your fibre to the servers (via HBA cards).

    So site 1 will have a server, a SAN director and your replicating SAN.
    Site 2 will also have the same thing.
    Then clustering will take place conveniently and this is the true meaning of HA where even your storage is also highly available.

    Let me know if you have any questions or if you need help to implement this. I can help.

    Come on Jimpen,
    You’re contradict yourself but I will help to shed some light get you back on track.
    When I stated that the servers can be geographically separated, you responded, Not really , meaning that the servers Cant be geographically separated .

    You certainly were not talking about the cost of implementation. If you had wanted to talk about expenses, you would have stated so.

    Are you probably trying to run away from what you’ve already written here? lol. Of course you can’t.
    Keep things simple: when you state something at EE, always let it be what you mean because we’re resolving a query.

    If I am to examine everything you’ve stated, it looks like you didn’t know know that the implementation I talked about is possible so you’ve mixed things up.

    If a client has a single SAN, two data centres (meaning two geographical locations) and two SAN directors, then the LUNs scanned (via HBAs) will be the same presented to the different servers and they will be off the same SAN irrespective of where the servers are connecting from.
    I figured out that you didn’t know this is possible basing on your response in response ID: 38971591. where you stated that Also SQL needs the HBA’s to be the same to work correctly.

    That’s why you talked about a NAS while responding, when you said that You want a SAN unit, not a NAS. in the same comment ID: 38971591 ; you didn’t consider the networking required across the WAN/GAN/MAN i.e, between the different data centres.
    The good news is that two or more SAN directors can be configured to work this way, hence you cannot say not really in response.

    Lastly, I would like to hint on your concept: a remote location SAN system as you state above. This rather is more of implementing HA at storage level, which also comes in handy for DR purposes, based on how you look at it and use it at a point in time.

    Bottom line: if you were trying to give an answer that is in a small normal range as you state, then you would have not said that that seems abnormal is not possible. It is indeed possible.

    Please let me know if you need any more info, or if you want to implement this anywhere in the world. so feel free.
    I hope we’re now on the same page 🙂


    28/08/2017

    Posted In: NEWS

    Tags: , , ,

    Leave a Comment

    Dell Compellent Enterprise Manager #dell #server #management #software


    #

    Dell Compellent Enterprise Manager
    Unmatched storage control and simplicity

    Overview:

    Enterprise Manager simplifies storage resource management by providing comprehensive monitoring and management of all local and remote Dell Compellent Storage Center systems. You can gain instant visibility and control of a multi-terabyte, multilocation environment, streamlining administration and reducing operating costs. Configure and verify remote replication processes, monitor storage capacity and disk utilization in real time, and generate comprehensive storage usage and performance reports — all from a single pane of glass.

    Storage Resource Management

    Dell Compellent Enterprise Manager simplifies network storage management by providing a single, centralized console for the administration of multiple local and remote Storage Center SANs. Users can configure and verify remote replication processes, monitor storage capacity and disk utilization in real time, and generate comprehensive enterprise storage usage and performance reports.

    How to Simplify Storage Admin with Enterprise Manager

    • Complete storage resource management for Dell Compellent enterprise storage environments
    • Drastically cuts day-to-day management time, resources and technology training
    • View your system from the standpoint of capacity, performance and path utilization, all from a granular point in time
    • Cuts administration time with a single interface and a complete view of storage resources
    • Simplifies disaster recovery process with reduced configuration time and easy online replication verification
    • Reduces disk costs with reports that allow you to accurately assess storage resources and plan for future capacity needs
    • Speeds event resolution with centralized alert notification and event log management
    • Optimizes performance by allowing you to identify and manage trends
    • Showcases the cost and power savings of Dell Compellent storage
    • Maximize resource utilization and reduce disk costs using accurate capacity and performance data
    • Streamline disaster recovery planning and replication configuration with a simple point-and-click interface
    • Speed event resolution with centralized alert notification and event log management
    • Identify trends and monitor enterprise storage use by business unit for accurate needs assessment and chargeback
    • Automatically calculate energy savings and generate boardroom-ready hero reports

    Key Benefits:

    Complex management limits the benefits of virtualization

    Managing complex storage tasks like replication and capacity planning for multi-terabyte SANs at multiple locations can be daunting, particularly if you require more than one interface. Operational costs and management complexity can grow exponentially with your enterprise, making administration even more difficult. Companies require a better and easier way to monitor and manage their storage area networks.

    Comprehensive SAN management

    Dell Compellent Enterprise Manager simplifies administration of Dell Compellent environments by providing comprehensive monitoring and management of all local and remote Storage Center SANs. You can drastically cut day-to-day SAN management time with a single interface that provides a complete view of your storage environment, streamlining administration and reducing operational costs.

    With Enterprise Manager, you can reduce costs by maximizing utilization and purchase storage more efficiently using accurate capacity and performance data. Streamline disaster recovery by reducing replication planning and configuration time with a point-and-click interface that helps you set up remote replication in as few as six clicks.

    Multiple systems, single interface

    With Enterprise Manager, all local and remote Storage Center systems are discovered using a single console. This centralized interface provides a complete view of all aspects of your Dell Compellent storage environment, significantly reducing storage administration time. You can choose from a variety of comparative views across all Storage Center systems, including total space available, used space, free space, number of volumes, number of Replays, number of replications, and savings vs. RAID 10.

    Easy-to-use reporting for informed decisions

    Enterprise Manager’s extensive system monitoring provides immediate insight into your storage environment, while easy-to-use reports summarize capacity utilization, replications and events. Make informed decisions and showcase your success as you decrease storage expenditures, simplify management, streamline disaster recovery and increase data center efficiency. Enterprise Manager lets you automatically e-mail reports daily, weekly or monthly, determine storage costs associated with the different tiers of capacity in your environment, translate storage technologies into actual dollar savings with boardroom-ready hero reports, and provide a powerful foundation for a green IT strategy by automatically calculating energy costs and CO2 emissions.

    Reduce spending and optimize performance

    The ability to accurately assess storage resources and plan for future capacity and performance needs reduces overall disk spending. Enterprise Manager simplifies capacity planning, increasing your storage purchase efficiency. You can view storage capacity utilization on all of your Storage Center systems over a period of time, including summaries from last week, last month, or last year, as well as important I/O details to help optimize performance.

    Easily view current and historical consumption for specific storage volumes over time to balance server loads and increase server purchase efficiency. Storage consumption reports include total space available, allocated space, used space and configured space for all disks and total space and used space for any RAID selection with any disk tier.

    You can gain valuable insight into current writable and historical and optimize capacity and performance planning with threshold alerts for storage and I/O usage and CPU and memory utilization information.


    Detailed information helps you purchase storage more efficiently.

    Simplify replication management

    Enterprise Manager simplifies disaster recovery with rremote replication setup in just a few clicks. This streamlined replication management also allows online replication verification and rapid recovery with a single-click disaster declaration.

    Using Enterprise Manager, you can easily and accurately estimate bandwidth requirements upfront based on actual data. Advanced bandwidth-shaping algorithms allow you to utilize the lowest bandwidth required while maintaining optimal performance. And you can monitor replication and bandwidth utilization over time to understand requirements and optimize transfer rates on an hourly basis throughout the day.

    Certified VMWare vCenter™ Site Recovery Manager (SRM) integration helps you enhance disaster recovery protection for your VMware virtualized environment.


    Quickly implement replication configurations that were previously too complex or time-consuming.

    Chargeback calculates true costs of storage

    Enterprise Manager’s storage-based chargeback feature automatically calculates storage costs based on the actual space consumed by applications. Administrators can assign different costs to each volume based on disk class or storage tier. Enterprise Manager monitors storage utilization and generates reports that identify the cost of storage consumption based on department name or account number. Chargeback reports can be scheduled for automatic email delivery to business units daily, weekly, monthly or quarterly.

    Powerful SRM with unmatched simplicity

    Enterprise Manager delivers powerful storage resource management software for Dell Compellent Storage Center SANs paired with unmatched control and simplicity. The complete Enterprise Manager suite features the following licensed software components: Enterprise Manager Foundation, Discovery, Replication Management, VMWare SRM Adapter, Event Management, Free Space Recovery, Enterprise Manager Reporter, Performance Management, Capacity Management, Threshold Alerting, Enterprise Manager Chargeback, Storage-Based Chargeback, Hero Reports, Power Savings.

    Technical Specifications:


    28/08/2017

    Posted In: NEWS

    Tags: , , ,

    Leave a Comment

    Index of #ubuntu #server #monitor


    #

    Ubuntu 15.04 (Vivid Vervet)

    Select an image

    Ubuntu is distributed on two types of images described below.

    Desktop image

    The desktop image allows you to try Ubuntu without changing your computer at all, and at your option to install it permanently later. This type of image is what most people will want to use. You will need at least 384MiB of RAM to install from this image.

    There are two images available, each for a different type of computer:

    64-bit PC (AMD64) desktop image Choose this to take full advantage of computers based on the AMD64 or EM64T architecture (e.g. Athlon64, Opteron, EM64T Xeon, Core 2). If you have a non-64-bit processor made by AMD, or if you need full support for 32-bit code, use the i386 images instead. 32-bit PC (i386) desktop image For almost all PCs. This includes most machines with Intel/AMD/etc type processors and almost all computers that run Microsoft Windows, as well as newer Apple Macintosh systems based on Intel processors. Choose this if you are at all unsure.

    Server install image

    The server install image allows you to install Ubuntu permanently on a computer for use as a server. It will not install a graphical user interface.

    There are two images available, each for a different type of computer:

    64-bit PC (AMD64) server install image Choose this to take full advantage of computers based on the AMD64 or EM64T architecture (e.g. Athlon64, Opteron, EM64T Xeon, Core 2). If you have a non-64-bit processor made by AMD, or if you need full support for 32-bit code, use the i386 images instead. 32-bit PC (i386) server install image For almost all PCs. This includes most machines with Intel/AMD/etc type processors and almost all computers that run Microsoft Windows, as well as newer Apple Macintosh systems based on Intel processors. Choose this if you are at all unsure.

    snappy Ubuntu Core images

    The snappy Ubuntu Core image allows you to install Ubuntu permanently on a computer, using the snappy transactional update system.

    There are two images available, each for a different type of computer:

    64-bit PC (AMD64) snappy image Choose this to take full advantage of computers based on the AMD64 or EM64T architecture (e.g. Athlon64, Opteron, EM64T Xeon, Core 2). If you have a non-64-bit processor made by AMD, or if you need full support for 32-bit code, use the Intel x86 images instead. ARMhf BeagleBone Black snappy image For BeagleBone Black boards.

    A full list of available files, including BitTorrent files, can be found below.

    If you need help burning these images to disk, see the Image Burning Guide .


    28/08/2017

    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    Welcome to Open Campus! #mcse, #mct, #mcp, #microsoft #certified, #systems #engineer,


    #

    Our Mission.

    The mission of RCCD Distance Education (formerly Open Campus) is to extend access to learning through distance education. Objectives: To facilitate learning at a distance, Distance Education provides:

    • Educational technology to the colleges, faculty, and students to support the delivery of online-based courses and services
    • Professional development and training for faculty
    • Expertise and experience
    • Blackboard management, production and problem solving.

    As of April 21, the Open Campus department has changed its name to Distance Education. We thank you for your patience as we work to complete the changes to website by the middle of summer.

    What Are Online Based or Distance Education classes?

    Online-based courses, also called Distance Education classes, may take two different forms:

    Online classes are taken exclusively over the Internet. Please note that, while some online courses provide all instructional content over the Internet, others may require some on-campus meetings. Please see the course schedule or WebAdvisor for more information.

    Hybrid classes meet both on campus and online. Think of them as a combination or blending of online classes and face-to-face classes.

    In a hybrid class, you will attend meetings on campus during the dates and times listed in the schedule of classes. Since the on-campus portion of hybrid classes could take place at any of our three colleges (Riverside City, Norco or Moreno Valley), hybrid classes are listed in the schedule by the college where the on-campus meetings will take place.

    Are there Face-to-Face classes that use the Internet?

    Web-Enhanced classes are traditional face-to-face classes that are supplemented with course websites and the use of Internet resources. Unlike hybrid or fully-online classes, all web-enhanced class meetings take place on campus.

    Where Do I Start?

    For more information about Blackboard and support, visit
    Students page


    27/08/2017

    Posted In: NEWS

    Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

    Leave a Comment

    Dedicated Server – Colocation – Virtual Private – Malaysia Hosting #dedicated


    #

    Dedicated Server

    Business class dedicated server that provides greater flexibility, space and bandwidth, and unmatched reliability. A dedicated server is a single web server within a network of computers, dedicated solely to one customer, most often a large business. It is a type of Internet hosting in which the client leases an entire server not shared with anyone. A dedicated server is typically a rented service. The user rents the server, software and an Internet connection from the Web host. This is more flexible than shared hosting, as organizations have full control over the servers, including choice of operating system, database, hardware and specific applications. Dedicated server are most often housed in data centers.

    • Intel Dual Core E6500 3.06Ghz
    • 2GB DDR RAM
    • NO Setup Fee
    • Free Remote Reboot
    • Free KVM over IP (On request)
    • Unmetered Bandwidth

    Only $99 /mo

    Colocation Services

    Colocation is a hosting option for small business who want the features of a large IT department without the costs. Colocation allows you to place your server in a rack in our data center and share our bandwidth as your own. It generally costs more than standard web hosting, but much less than the cost of a comparable amount of bandwidth into your place of business, along with the power required to run and effectively and consistently cool the equipment. Once you have a machine set up, you take it physically to the location of the colocation provider and install it in their rack or you rent a server machine from the colocation provider. The company then provides an IP, bandwidth, and power to your server. Once it s up and running, you access it much like you would access a Web site on a hosting provider. The difference being that you own the hardware. With IT and communications facilities in safe, secure hands, you can enjoy less latency and the freedom to focus on your core business

    • 1U Single Co-Location
    • 10Mbps Shared Bandwidth
    • unmetered Monthly Traffic
    • Advanced Layer 2 Firewall
    • Cat 6 Cable with Gigabit LAN
    • 99% Uptime Guarantee

    Only $80 /mo

    Virtual Private Server

    A virtual private server (VPS) is a single server partitioned into multiple sections that each function as an independent server. It is a hosting environment that combines both benefits of shared and dedicated hosting. It gives you the freedom to configure your server any way you want and costs less than buying your own server. Each virtual server can run its own full-fledged operating system, and each server can be independently rebooted. A VPS is the low cost solution that gives you all that functionality and requires less technical knowledge than having your own server. You have complete control of your server software, but we maintain the hardware and keep it up and running for you.

    • Cpu Resources: 400Mhz
    • 20GB Hardware Raid-10
    • NO Setup Fee
    • 256MB RAM
    • 260GB Monthly bandwidth
    • 1 Dedicated IP

    Only $19.99 /mo


    24/08/2017

    Posted In: NEWS

    Tags: , , , , , ,

    Leave a Comment

    GoDaddy Dedicated Server Review #godaddy #dedicated #server #review, #godaddy #dedicated #server


    #

    GoDaddy Review

    Price: $62.99 (2x120GB HDD, 2GB RAM)

    GoDaddy also has some of the best prices around. Even when taking advantage of some of their greatest packages, the pricing is still very minimal compared to some alternatives.

    When it comes to dedicated servers, GoDaddy.com has a few strides over the competition. Their many different packages and programs allow you choice and the ability to get what you actually need – nothing you don t. What you re probably looking for a piece of mind, security and the knowledge that you can trust in the service provider you have just chosen without all the hassle that can come with it. Here s what GoDaddy offers you with their dedicated servers to help put your mind at ease.

    GoDaddy caters to both Windows and Linux servers with a wide range of operating systems and prices that can suit your needs. Each package is unique in its own way and gives you features from their fastest level of processing to their largest online storage. These are some of the many benefits and sweet perks you ll receive as a customer of one of their hosting plans:

    The packages range from Economy, Deluxe, Premium, Value Deal, Power Player and Storage Monster, depending on the types of services that you require.

    Bandwidth ranges widely from 500GB / month (Economy) to 3,000GB / month (Premium) that allow you to use and maintain the amount of data that you need to upload and run on your site

    The Economy and Value Deal packages offer 2GB RAM for the modest user, while the others offer 4GB RAM, except the 64 bit options, which offer a full 8GB RAM.

    Year round you are backed by 24/7 support. They maintain their servers, keeping a watchful eye over your website to ensure that any and all threats are caught before they can do any damage.

    Not only do they offer security support, but they also offer 24/7 phone support for all your hosting questions, comments or concerns

    All the dedicated server plans that GoDaddy offers come with these perks on top of the service you are getting: Up to $129.93 in Google Adwords Credit, $103.95 Bing / Yahoo Search Credit, $51.97 Facebook Advertising Credit, SSL Certificate, 3 dedicated IP Addresses, 10 Fotolia Credits and Bandwidth Overage Protection

    Their plans offer the operating systems Ubuntu, CentOS, Fedora and Windows so that you have a wide array of places to start from

    In addition to having both Linux and Windows plans and packages offered, they also have 64 bit plans that allow for the best possible performance and even up to 8 GB RAM. These packages give you up to 2, 64 GB solid-state drives for all your memory needs and an allowable 3,000 GB per month for bandwidth.

    All of GoDaddy s servers are protected with Tipping Point Intrusion Protection Systems. An advanced piece of software that constantly scans packages and determines whether they are malicious or perceived as a threat. The filters are updated on a regular basis to ensure that the most up-to-date protection is offered.

    Prices range from #65.47 / month (Economy) up to $280.65 /month (Premium) on a 12 month contract. The longer you sign up for, the better the deal will get. 1, 6, 12 and 24 month contracts are available for the deal that you think will be best. Their 64 bit package pricing ranges from $187.09 to $392.92 / month on a 12 month commitment. Longer term commitments are available if you should require better deals

    GoDaddy seems to have you covered when it comes to getting the best deal of the day. As opposed to other hosting companies, GoDaddy allows you to install almost anything on the server and run it, provided it s not malicious, host different websites on just one account and a dedicated server that has very versatile uses like gaming, virtual hosting and high-traffic websites. Whether you are the micro-business or individual just looking for a dedicated server, GoDaddy is worth being considered before you make your selection.


    24/08/2017

    Posted In: NEWS

    Tags: , , , , ,

    Leave a Comment

    What – s the difference between a CTE and a Temp


    #

    This is pretty broad, but I’ll give you as general an answer as I can.

    • Are unindexable (but can use existing indexes on referenced objects)
    • Cannot have constraints
    • Are essentially disposable VIEW s
    • Persist only until the next query is run
    • Can be recursive
    • Do not have dedicated stats (rely on stats on the underlying objects)
    • Are real materialized tables that exist in tempdb
    • Can be indexed
    • Can have constraints
    • Persist for the life of the current CONNECTION
    • Can be referenced by other queries or subprocedures
    • Have dedicated stats generated by the engine

    As far as when to use each, they have very different use cases. If you will have a very large result set, or need to refer to it more than once, put it in a #temp table. If it needs to be recursive, is disposable, or is just to simplify something logically, a CTE is preferred.

    Also, a CTE should never be used for performance. You will almost never speed things up by using a CTE, because, again, it’s just a disposable view. You can do some neat things with them but speeding up a query isn’t really one of them.

    answered Feb 15 ’12 at 16:54

    Please see Martin’s comments below:

    The CTE is not materialised as a table in memory. It is just a way of encapsulating a query definition. In the case of the OP it will be inlined and the same as just doing SELECT Column1, Column2, Column3 FROM SomeTable. Most of the time they do not get materialised up front, which is why this returns no rows WITH T(X) AS (SELECT NEWID())SELECT * FROM T T1 JOIN T T2 ON T1.X=T2.X. also check the execution plans. Though sometimes it is possible to hack the plan to get a spool. There is a connect item requesting a hint for this. – Martin Smith Feb 15 ’12 at 17:08

    A CTE creates the table being used in memory, but is only valid for the specific query following it. When using recursion, this can be an effective structure.

    You might also want to consider using a table variable. This is used as a temp table is used, is also in-memory only, and can be used multiple times without needing to be re-materialized for each join. Also, if you need to persist a few records now, add a few more records after the next select, add a few more records after another op, then return just those handful of records, then this can be a handy in-memory structure.

    Temp Table

    A temp table is literally a table created on disk, just in a specific database that everyone knows can be deleted. It is the responsibility of a good dev to destroy those tables when they are no longer needed, but a DBA can also wipe them.

    Temporary tables come in two variety: Local and global. In terms of MS Sql Server you use a #tableName designation for local, and ##tableName designation for global (note the use of a single or double # as the identifying characteristic).

    Notice that with temp tables, as opposed to table variables or CTE, you can apply indexes and the like, as these are legitimately tables in the normal sense of the word.

    Generally I would use temp tables for longer or larger queries, and CTEs or table variables if I had a small dataset already and wanted to just quickly script up a bit of code for something small. Experience and the advice of others indicates that you should use CTEs where you have a small number of rows being returned from it. If you have a large number, you would probably benefit from the ability to index on the temp table.

    The accepted answer here says “a CTE should never be used for performance” – but that could mislead. In the context of CTEs versus temp tables, I’ve just finished removing a swathe of junk from a suite of stored procs because some doofus must’ve thought there was little or no overhead to using temp tables. I shoved the lot into CTEs, except those which were legitimately going to be re-used throughout the process. I gained about 20% performance by all metrics. I then set about removing all the cursors which were trying to implement recursive processing. This was where I saw the greatest gain. I ended up slashing response times by a factor of ten.

    CTEs and temp tables do have very different use cases. I just want to emphasise that, while not a panacea, the comprehension and correct use of CTEs can lead to some truly stellar improvements in both code quality/maintainability and speed. Since I got a handle on them, I see temp tables and cursors as the great evils of SQL processing. I can get by just fine with table variables and CTEs for almost everything now. My code is cleaner and faster.

    answered Feb 17 ’12 at 9:49

    The primary reason to use CTEs is to access Window Functions such as row_number() and various others.

    This means you can do things like get the first or last row per group VERY VERY quickly and efficiently – more efficiently than other means in most practical cases .

    You can run a similar query to the above using a correlated subquery or by using a sub-query but the CTE will be faster in almost all scenarios.

    Additionally, CTEs can really help simplify your code. This can lead to performance gains because you understand the query more and can introduce more business logic to help the optimizer be more selective.

    Additionally, CTEs can boost performance if you understand your business logic and know which parts of the query should be run first – typically, put your most selective queries first that lead to result sets that can use an index in their next join and add the option(force order) query hint

    Finally, CTEs don’t use tempdb by default so you reduce contention on that bottleneck through their use.

    Temporary tables should be used if you need to query the data multiple times, or alternatively if you measure your queries and discover that by inserting to a temp table and then adding an index that your performance is improved.

    answered Oct 8 ’13 at 0:50

    There seems to be a bit of negativity here towards CTE’s.

    My understanding of a CTE is that it’s basically a kind of adhoc view. SQL is both a declarative and a set based language. CTE’s are a great way of declaring a set! Not being able to index a CTE is actually a good thing because you don’t need to! It’s really a kind of syntactic sugar to make the query easier to read/write. Any decent optimizer will work out the best access plan using indexes on the underlying tables. This means you could effectively speed up your CTE query by following the index advice on the underlying tables.

    Also, just because you defined a set as a CTE, it doesn’t mean that all rows in the set must be processed. Dependent on the query the optimizer might process “just enough” rows to satisfy the query. Maybe you only needed the first 20 or so for your screen. If you built a temp table then you really do need to read/write all those rows!

    Based on this I would say that CTE’s are a great feature of SQL and can be used anywhere they make the query easier to read. I would only think about a temp table for a batch process that would really need to process every single record. Even then afaik it’s not really recommended because on a temp table it’s far harder for the database to help you with caching and indexes. It might be better to have a permanent table with a PK field unique to your transaction.

    I have to admit that my experience is mainly with DB2 so I’m assuming that CTE’s work in a similar way in both products. I will happily stand corrected if CTE’s are somehow inferior in SQL server. 😉

    answered Mar 24 ’14 at 22:30

    2017 Stack Exchange, Inc


    24/08/2017

    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    Hybrid Business Intelligence with Power BI #sql #server, #powerbi, #hybrid #business


    #

    Hybrid Business Intelligence with Power BI

    This week in the social media chatter, I noticed tweets regarding a new Microsoft white paper by Joseph D Antoni and Stacia Misner published to TechNet on Hybrid Business Intelligence with Power BI. This white paper is a fantastic technical overview and a must-read for groups looking at Power BI, wondering how to best implement it with existing on-premises business intelligence BI, or Azure Infrastracture as a Service (IaaS) hosted BI. Covered topics include:

    • hybrid BI technical architecture options
    • data management gateway
    • best practices for:
      • integrating security
      • identity management
      • networking
      • Office 365

    Aside from small businesses that may only have cloud hosted solutions, many businesses currently have a combination of cloud and on-premises data sources. Just think about how many groups use Salesforce.com, Google Analytics, Constant Contact, and other departmental cloud applications. Typically, I see those groups leveraging APIs or connectors to bring cloud data back on site into a local data warehouse for creating reports. We are taking those same concepts quite a bit further with Microsoft Azure and Power BI.

    Ideally, we are no longer moving all of the data in our big data world. Concepts like data virtualization, for example, are becoming more popular. Most likely, we are now tasked to deliver a transparent Microsoft BI experience across Office 365 and existing on-premises SharePoint portals or data sources.

    Understanding how to architect hybrid-BI scenarios is becoming a more important skill to master in our profession. However, prior to this new white paper, finding the answers and best practices for it was fairly challenging.

    Security in a Hybrid World

    Upon a brief skim through this new technical whitepaper, I noticed a lot of content around networking and identity management. Historically, identity management and security in Microsoft BI has not been easy to master. In a hybrid BI world, these topics appear to be comparable or even a bit more complex.

    Let s face it, getting through a SharePoint 2013 BI farm installation and configuration can be a daunting process for even the top talent in the world. I usually advise to folks considering a new SharePoint 2013 BI farm installation to first read Kay Unkroth s incredible white paper to understand SharePoint security, Microsoft BI security, and Kerberos delegation concepts.

    Managing user security in Office 365 looks comparable to on-premises SharePoint security. There are options to federate Active Directory (AD) to Office 365 and use Single Sign On (SSO). There are additional alternatives for multi-factor authentication in scenarios where you require additional layers of security.

    In hybrid BI scenarios where you have Analysis Services or Reporting Services hosted on Microsoft Azure VMs, you might also need to configure Azure AD, AD Federation Services (ADFS), and the Azure Active Directory Sync tool to synchronize passwords, users, and groups between on-premises AD and Azure AD supporting the Office 365 installation. The new Hybrid Business Intelligence with Power BI white paper goes into detail on those concepts and includes links to a plethora of excellent resources.

    Data Management Gateway for Power BI

    At the moment, Data Management Gateway appears to be the key to hybrid BI with Office 365 Power BI. The Data Management Gateway is a client agent application that is installed on an on-premises server and copies data from internal data sources to the Power BI cloud data source format.

    Office 365 Power BI data sources are a bit of a cloud data island per se, but over time it should continue to evolve. Present Power BI Data Refresh capabilities, basically Excel workbooks deployed to a Power BI site, can have a single data refresh schedule from the following supported data sources:

    • On-premises SQL Server (2005 and later)
    • On-premises Oracle (10g and later)
    • Azure SQL Database
    • OData feed
    • Azure VM running SQL Server

    Now, if you have a VPN connection and Azure virtual network, it opens up many more potential data sources for Power BI. In that case, accessing data sources with Power BI data connections and scheduled refresh is similar to on-premises Power Pivot except it sure looks like you still need Data Management Gateway to get that data into Power BI-land. The white paper section labeled Power BI Data Refresh goes into deep detail on supported data sources, data refresh schedules, and various data location scenarios.

    Sending Feedback to Microsoft

    We are just beginning to see Microsoft BI and Power BI in a cloud and hybrid world. Groups that are using Power BI and hybrid BI today are early adopters. We would all benefit from hearing about their tips, tricks, and lessons learned. I see a lot of continual changes in Azure and total confusion out here especially around Azure cloud BI and Power BI with on-premises data sources.

    If you have Microsoft technical content requests, you can send feedback to the teams that develop these resources to get new topics on their radar. Don t assume someone else has already expressed a need. If no one asks or complains, the folks in Redmond may be completely unaware of that need. It really is that simple.


    24/08/2017

    Posted In: NEWS

    Tags: , , , , , , , , , , , , , , , ,

    Leave a Comment

    What is Gateway? Webopedia Definition #node, #network, #gateway, #communication, #server, #lan,


    #

    gateway

    Related Terms

    (n.)(1) A node on a network that serves as an entrance to another network. In enterprises, the gateway is the computer that routes the traffic from a workstation to the outside network that is serving the Web pages. In homes, the gateway is the ISP that connects the user to the internet.

    In enterprises, the gateway node often acts as a proxy server and a firewall. The gateway is also associated with both a router. which use headers and forwarding tables to determine where packets are sent, and a switch. which provides the actual path for the packet in and out of the gateway.

    (2) A computer system located on earth that switches data signals and voice signals between satellites and terrestrial networks.

    (3) An earlier term for router. though now obsolete in this sense as router is commonly used.

    NEXT
    gateway antivirus

    Related Links

    TECH RESOURCES FROM OUR PARTNERS

    WEBOPEDIA WEEKLY

    Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.

    From keyword analysis to backlinks and Google search engine algorithm updates, our search engine optimization glossary lists 85 SEO terms you need. Read More

    Microsoft Windows is a family of operating systems for personal computers. In this article we look at the history of Microsoft operating. Read More

    From Goats to Penguins, a server outage and trillions of searches, our slideshow presents interesting facts about Google and the Google.com. Read More

    Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and. Read More

    This second Study Guide describes the basics of Java, providing an overview of operators, modifiers and control Structures. Read More

    The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare. Read More


    24/08/2017

    Posted In: NEWS

    Tags: , , , , , , , , , ,

    Leave a Comment

    Dynamic PIVOT in Sql Server #concatenate #in #sql #server


    #

    SqlHints.com

    Dynamic PIVOT in Sql Server

    In the Previous Post PIVOT and UNPIVOT in Sql Server explained how PIVOT relational operator can be used to transform columns distinct values as Columns in the result set by mentioning all the distinct column values in the PIVOT operators PIVOT columns IN clause. This type of PIVOT query is called Static PIVOT query, because if the PIVOT column in the source table get s extra unique values after the initial query then that will not reflect in the PIVOT query result unless it is mentioned in the PIVOT Columns IN clause. Static PIVOT queries are fine as long as we know that the PIVOT column values never change, for instance if PIVOT column values are MONTH or Day of the Week or hour of the day etc.

    In this Article will present how we can write a Dynamic PIVOT query with an example, where we don t need to mention the PIVOT columns each unique values and no need to worry if PIVOT column gets extra unique values after the initial query.

    First Create a Temporary Table #CourseSales with sample records as depicted in the below image by using the following script:

    PIVOT #CourseSales Table data on the Course column Values

    Let us first understand the Static PIVOT query and then see how we can modify this Static PIVOT query to Dynamic.

    Static PIVOT query

    Below Static PIVOT script pivots the #CourseSales Table data so that the Course columns distinct values are transformed as Columns in the result set as depicted in the above image.

    Let us insert one more row in the #CourseSales table for the new course SQL Server with below insert statement.

    From the above result it is clear that the newly added course Sql Server sales data is not reflected in the result.

    Dynamic PIVOT Query

    To make the above Static PIVOT query to dynamic, basically we have to remove the hardcoded PIVOT column names specified in the PIVOT operators PIVOT columns IN clause. Below query demonstrates this.

    From the above result it is clear that this query is a True Dynamic PIVOT query as it reflected all the courses in the #CourseSales table without needing to write hardcoded course names in the PIVOT query.

    Examples of PIVOT and Dynamic PIVOT

    Below are the some of the examples of retrieving data in Sql Server using PIVOT and Dynamic PIVOT:

    Post navigation

    Deepak Bhise says:

    I executing below query, where error is Incorrect Syntax Near Pivot

    go
    with taxdet as
    (Select tbi.bill_item_id,tbi.Sr_number, tbi.item_id,tbi.total_amt, tbt.tax_amt, tbt.sub_tax_id,
    tbm.Bill_no, tbm.Bill_amount, tbm.current_table_no, tstm.SubTax_Name
    from tblBill_Items tbi
    Right Join tblBill_taxes tbt on tbt.Corelation_id = tbi.bill_item_id
    Right Join tblBill_master tbm on tbm.Sr_number = tbi.Sr_number
    Left Join tblSubTax_master as tstm on tstm.SubTax_id = tbt.sub_tax_id
    where tbt.tax_id = 1 and tbm.isSettle = 1 and tbm.Bill_no 0)
    Select * from taxdet
    Select * into DPKTAX from (Select * from Taxdet)
    set nocount on

    this is great but,
    this is not dynamic at all, because at the top of the query you are trying to find the pivot columns and writting these columns hardcoded so this is not exactly dynamic but half dynamic :)) but however this is great post thanks.

    We Can eliminate Null values in the pivoted list as below

    Vu Hong Trieu says:

    Thanks tut,
    So i try this but my solution useful
    1. My data here:

    Execute the Dynamic Pivot Query

    4. So i want to my result that:

    Owais Ahmed Memon says:

    i have one table contain two columns one is Type_of_case and other is Stage Both

    i want to prepare lookup table

    i tried your example its working ok but i am un able to make it for my table
    heres the list of all colums for instance

    SELECT TOP 1000 [Case_id]
    ,[District]
    ,[WM_Office]
    ,[WM_Complaint_no]
    ,[Complainant_name]
    ,[Tracking_ID]
    ,[Retained_CNIC]
    ,[Sur_CNIC]
    ,[Subject]
    ,[Type_of_case]
    ,[Date_of_registration]
    ,[Disposal_Date]
    ,[WM_Regulation]
    ,[Attended_by]
    ,[Hearing_dt]
    ,[Stage]
    ,[Ticket_no]
    ,[Remarks]
    FROM [WM_Cases].[dbo].[Cases_main]

    i need this result
    Type_of_case Total Of Case_id Case Closed Closure Finding Received
    Admin 6 1 5
    Age 70 1 65 4
    Decipline 54 2 35 8

    and here is the result (I am shortening field lables)
    Patient ID Document Number Claim N CARE U007
    1000 289 1 76.58 19.53

    However I need the result be like:

    Patient ID Document Number Claim N Insu1 Insu2 Paid1 Paid2
    01000 289 1 CARE U007 76.58 19.53

    My query is working successfully, but some of the columns are not showing up. For instance, in the Name Column, I have the values Object , Use , and Size that I am trying to use as column headers, but only the Use and Size are appearing as headers. I can see Object as a value in the table I m pivoting from, so I don t know why it s hidden. Can anyone help?

    Subscribe to Blog via Email

    Disclaimer

    This is my personal blog site. The opinions expressed here represent my own and not those of my employer. For accuracy and official reference refer to MS Books On Line and/or MSDN/TechNet. My employer do not endorse any tools, applications, books, or concepts mentioned on the blog. I have documented my personal experience on this blog.

    Differences

    Categories

    Archives

    Sql Server Tutorial

    Recent Posts

    Tags

    SqlHints.com © 2016. All Rights Reserved.


    23/08/2017

    Posted In: NEWS

    Tags: , , ,

    Leave a Comment

    Free Windows Server 2008 Trial for 240 Days #download #windows #server


    #

    Free Windows Server 2008 Trial for 240 Days

    Tweet on Twitter

    Free Windows Server 2008 trial is available by Microsoft to promoting the popularity of Windows Server 2008 over server operating system market. Since Microsoft Windows Server 2008 is the latest generation of Windows Server series and predecessor Windows Server 2003.

    Windows Server 2008 builds based on code base as Windows Vista; therefore, it shares much of the same architecture and functionality. while delivering valuable new functionality and powerful improvements to the base operating system to provide solid foundation for information technology (IT) infrastructure.

    A look at new Windows Server 2008 functionality:

    Windows Server 2008 has features rich upgrade with numerous functional advantages over its predecessors windows server 2003. Here are some of the changes in this release that I feel will have the biggest customer impact.

    • Server Manager. the expanded Microsoft Management Console (MMC), provides a one-stop interface for server configuration and monitoring with wizards to streamline common server management tasks.
    • Windows PowerShell. a new optional command-line shell and scripting language, enables administrators to automate routine system administration tasks across multiple servers.
    • Windows Reliability and Performance Monitor provides powerful diagnostic tools to give you ongoing visibility into your server environment, both physical and virtual, to pinpoint and resolve issues quickly.
    • Optimized server administration and data replication for increased control over servers located in remote locations, such as a branch office.
    • Componentized Server Core installation option allows minimal installations where only the server roles and features you need are installed, reducing maintenance needs and decreasing the available attack surface of the server.
    • Windows Deployment Services (WDS) provides a simplified, highly secure means of rapidly deploying Windows operating systems to computers by using network-based installation.
    • Failover clustering wizards make it easy for even IT generalists to implement high-availability solutions, Internet Protocol version 6 (IPv6) is now fully integrated, and geographically dispersed cluster nodes no longer need to be on the same IP subnet or configured with complicated Virtual Local Area Networks (VLANs).
    • Network Load Balancing (NLB) now supports IPv6 and includes multiple dedicated IP address support which allows multiple applications to be hosted on the same NLB cluster.
    • Windows Server Backup incorporates faster backup technology and simplifies data or operating system restoration.

    As Microsoft provides free download Windows Server 2008 trial software on various edition like standard. DataCenter. Enterprise and Web Server for users and developers to evaluate and try. The free Windows Server 2008 trial version download is initially offer 60 days (expendable to 240 days), without the need for product activation or entering a product key). Although it’s mentioned as trial software, the installed copy of Windows Server 2008 can be activated with a valid and genuine product key and used as full version product with no expiry date or grace period for activation.

    Free Download links for Windows Server 2008 Edition:

    Do note that the download will be big normally between 1 to 5 GB.


    23/08/2017

    Posted In: NEWS

    Tags: , , , , ,

    Leave a Comment

    Capacity Planning, IT Capacity Planning Reports, Infrastructure Capacity Planning and Trending


    #

    Capacity Planning and Reporting

    With ManageEngine Applications Manager’s capacity planning and reporting ability you can monitor, measure and report your enterprise’s capacity, ensuring it s always efficiently allocated.

    ManageEngine Applications Manager supports over 100 performance metrics that can aide capacity planning for a heterogeneous set of applications and IT resources ranging from servers, databases, applications, web servers and web services.

    Accurate capacity analysis of resources

    Get complete capacity management for both physical and virtual servers with instant graphs on critical performance metrics such as

    • CPU utilization
    • Memory utilization
    • Disk I/O utilization
    • Network utilization

    >Measure overall resource usage as well as usage by workload.

    Troubleshoot capacity problems and allocate capacity to where it s needed.

    With configurable threshold settings you can identify servers and virtual machines that can be right-sized so that its workload can get sufficient capacity.

    Discover capacity bottlenecks even in dynamic VMware environments.

    Get proactive alerts and locate the source of the capacity problem by drilling into the performance metrics.

    Capacity reports filtered over various customized time periods.

    Measure overall resource usage with detailed reports of excess or insufficient capacity from undersized, oversized and idle servers/virtual machines.

    Reports can be exported in PDF, Excel, CSV and e-mail formats.

    Unix and Solaris Capacity Planning

    The server monitoring and capacity planning abilities help plan virtualization efforts with capability to monitor CPU, memory, disk, network traffic, etc. It also helps understand how resource usage varies across time

    Oracle Capacity Planning

    ManageEngine Applications Manager provides the ability to monitor performance of various Oracle Applications. You can plan capacity for Oracle database, Oracle Application Servers (Oracle AS), Oracle WebLogic, Oracle E-Business Suite, etc. In addition to capacity planning, there is support for Oracle database monitoring. Oracle E-Business Suite Performance Monitoring and Oracle application server monitoring.

    IBM Capacity Planning

    ManageEngine Applications Manager provides the ability to monitor the performance of IBM Applications. We support for performance management and capacity planning for IBM WebSphere, WebSphere MQ, IBM DB2 and AS/400 or IBM iSeries.

    Infrastructure Capacity Planning


    19/08/2017

    Posted In: NEWS

    Tags: , , , , , , , , , , ,

    Leave a Comment

    Learn cloud computing technologies and test your skills with Cloud Academy


    #

    Cloud Training Has Never Been Easier

    Automate the onboarding process for new team members, easily manage user privileges, and track progress of each member’s skills and your organization’s overall cloud training goals.

    Team Progress Monitoring

    Monitor your organization’s training progress with key performance metrics for understanding how much time teams and individual members are investing in cloud training, track the quality of their responses in quizzes, and more.

    Cloud Academy for Teams includes gamification features to engage and motivate your teams to keep their cloud skills up to date.

    Learn More

    Case Studies

    At Cloud Academy, we’ve helped secure an ever-increasing number of successful enterprise cloud migration and training projects around the world. Our vendor neutral, continuous learning platform is designed to help IT professionals and managers quickly learn new cloud computing skills, acquire cloud certifications, and stay up to date with the latest technologies.

    Explore how other global enterprises and startups have used our platform

    Cloud Academy Learning Paths direct our employees through a focus area, allowing them to begin a long journey pointing in the optimal direction.

    It’s far more cost effective and less disruptive than sending someone to a week (or weeks) of training. People can learn just what they need, when they need it, at a time and in a place that is convenient for them.

    We achieved outstanding results with Cloud Academy. The team really enjoys working with the platform, the gamification of the e-learning process works great to motivate them and grow.

    Meet some of our customers

    Founder, CEO at CloudCheckr

    The Cloud Academy platform was great. Quizzes and prep courses gave me a thorough understanding of the material on the certification test.

    Cloud Consulting Manager

    The others have courses, but it’s not a complete package. You guys definitely have more!

    IT Systems Architect at SpaceX

    Cloud Academy has a lot of content covering a diverse set of topics. I enjoyed that a good number of the non-basic services are covered.

    All content on CloudAcademy.com is the sole property of Cloud Academy, Inc. Rackspace and Rackspace Logo are a registered trademark of Rackspace US, Inc. Amazon Web Services (AWS) and Amazon Web Services Logo are a registered trademark of Amazon Web Services, Inc. Google and the Google Logo are registered trademarks of Google Inc. Azure and Azure Logo are registered trademarks of Microsoft Corporation.
    CloudAcademy Inc. is not affiliated with Rackspace US, Inc. or Amazon Web Services, Inc. or Amazon.com, Inc. or Google, Inc. or Microsoft Corporation and has no claim or interest in any mark owned by Rackspace US, Inc. or Amazon Web Services, Inc. or Amazon.com, Inc. or Google, Inc. or Microsoft Corporation. Our services are not authorized, sponsored, approved, certified or endorsed by Rackspace US, Inc. or Amazon Web Services, Inc. or Amazon.com, Inc. or Google, Inc. or Microsoft Corporation.
    All trademarks, service marks, trade names, trade dress, product names and logos appearing on the site are the property of their respective owners. Any rights not expressly granted herein are reserved.

    Terms of Use – Privacy Policy Copyright 2017 Cloud Academy Inc. All rights reserved.

    start your 7-day free trial become a member Unlock this lab upgrade to Register for free

    This lab is only available with a Cloud Academy subscription.

    Because our labs give you access to a live production environment, a subscription is required for selected labs.

    To unlock this lab, skip your trial and subscribe to Cloud Academy!

    Full access to the library

  • Check
    No charges for 7 days
  • Check
    Cancel anytime
    • Check
      Hands-on Labs
    • Check
      Full access to the library
    • Check
      New content every month
    • Check
      Enjoy all our features
    • Check
      New content every month
    • Check
      Downloadable Courses
    • Check

      Cloud Academy Certificates


    17/08/2017

    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    Log Analysis in Hadoop – Hadoop Online Tutorials #server #log #analysis


    #

    Log Analysis in Hadoop 5

    Table of Contents

    Log Files:

    Logs are computer-generated files that capture network and server operations data.They are useful during various stages of software development, mainly for debugging and profiling purposes and also for managing network operations.

    Need For Log Files:

    Log files are commonly used at customer’s installations for the purpose of permanent
    software monitoring and/or fine-tuning. Logs are essential in operating systems, computer networks, distributed systems and storage filers. Uses of Log File analysis are:

    • Application/hardware debugging and profiling
    • Error or Access statistics will be useful for fine tuning the application/hardware functionality For example. based on the frequency of an error message in the past 6 months, we can forecast its occurrence in the future and before it s occurrence on customer s application/hardware, if we can provide a fix for the error, then customer satisfaction will be improved which in turn business will increase.
    • Security monitoring of Application/hardware For example. if we suspect a security breach, we can use server log data to identify and repair the vulnerability.

    Log File Types:

    These log files can be generated from two types of servers Web Servers and Application Servers.

    Web Server Logs:

    Web servers typically provide at least two types of log files: access log and error log .

    • Access log records all requests that were made of this server including the client IP address, URL, response code, response size, etc.
    • Error log records all requests that failed and the reason for the failure as recorded by the application.

    For Example, logs generated by any web server like Apache logs. logs of this site hadooptutorial.info provided in the following sections of this post.

    Application Server Logs:

    These are the logs generated by applications servers and the custom logs generated by these can provide a great level of detail for application developers and analysts to understand how the application is used. Since developers can log arbitrary information, application server logs can be even larger than web server logs.

    For example, logs generated by Hadoop daemons can be treated as Application logs.

    Challenges in Processing Log Files:

    • As the log files are being continuously produced in various tiers with different types of information, the main challenge is to store and process this much data in an efficient manner to produce rich insights into the application and customer behavior. For example, A moderate web server will generate logs of size at least in GB s for a month period.
    • We cannot store this much of data into a relational database system. RDBMS systems can be very expensive and cheaper alternatives like MySQL cannot
      scale to the volume of data that is continuously being added.
    • A better solution is to store all the log files in HDFS which stores data on commodity hardware, so it will be cost effective to store huge volumes (TBs or PBs) of log files in HDFS and Hadoop provides Mapreduce framework for parallel processing of these files.

    Hadoop eco system sub components Pig, Hive support various UDF s that can be used to parse these unstructured log files and store them in structured format.

    Log File Processing Architecture:

    As hadoop supports processing of structured, semi structured and un structured data efficiently, Log files are the good real time examples of un structured data, and processing them through hadoop will be the best use case for hadoop in action.

    Below is the high level architecture of Log analysis in hadoop and producing useful visualizations out of it.

    As shown in the above architecture below are the major roles in Log Analysis in Hadoop.

    Flume Collection streaming log data into HDFS from various HTTP sources and Application Servers.

    HDFS HDFS is the storage file system for huge volumes of log data collected by flume.

    Pig Parses these log files into structured format through various UDF s.

    Hive Hive or Hcatalog will define schema to this structured data and schema will be stored in hive metastore.

    Hunk Search processing and Visualization tool that provides connectivity to Hive server and metastore and pull the structured data into it. On top it we can build various types of visualization charts. For more details on this connectivity to hive and visualizations on top of it refer the post Hunk Hive connectivity .

    Tableau It is a visualization tool that provides connectivity to Hive server. For more details on this refer the post Tableau connectivity with Hive .

    Sample Use Cases for Log File Analysis:
    • Ranked list of the most significant trends and page views over the last day/week/month
    • Identify the characteristics of the most active users to help promote this behavior across the board
    • Co-relate user sessions with transactional data to better understand how to improve sales

    In the next post, we will discuss about loading parsing web server logs and custom application logs using pig and making them structured to be ready for defining schema in hive/hcatalog.

    Share this:

    Do You need Big Data Job Support ?

    Next Spark Batch Starting From 3rd April

    Course Includes Below topics

    4. Spark Streaming

    Detailed Spark Course Contents at link http://hadooptutorial.info/spark-course-contents/

    Limited Seats available, please register by calling on +91-9704231873 (Whatsapp) and make initial payment to confirm your registration.


    17/08/2017

    Posted In: NEWS

    Tags: , ,

    Leave a Comment