Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
675 result(s) for "COMPUTERS / Operating Systems / Virtualization"
Sort by:
VMware NSX cookbook
VMware NSX is a software-based networking and security virtualization platform that delivers an operational model of a virtual machine for the network. By virtualizing the network, NSX breaks through current physical network barriers and enables data center operators to achieve better speed and agility with reduced costs.
Mastering Kubernetes
Kubernetes is an open source system used to automate the deployment, scaling, and management of containerized applications. If you are running more than just a few containers or want automated management of your containers, you need Kubernetes. This book focuses on helping you master the advanced management of Kubernetes clusters.
vSphere virtual machine management
A virtual machine (VM) is a software implementation of a machine (a computer) that executes programs like a physical machine. vSphere has clusters of virtual machines that are all interconnected. Virtualization changes everything. Virtual machines have far more functionality than physical servers and are capable of incredible things. Virtual machines should not be treated and administered exactly like physical servers. It is imperative that the administrators know how to correctly create and administer virtual machines. vSphere Virtual Machine Management depicts how to create a virtual machine step-by-step using multiple creation methods. In this book, you will learn how to develop virtual machine performance, resource allocation, and performance monitoring in detail. You will also be introduced to load balancing and virtual machine availability concepts and configurations. This book looks at the different ways to create virtual machines, and breaks down the many different configuration options that are available. It will take you through a number of step-by-step instructions that will help you understand virtual machine features and how to configure them. Not only will you learn how to create and configure virtual machines, but you will also be introduced to many of the advanced configuration options that are available in vSphere. We will also take a look at virtual machine performance, resource allocation options, and how to monitor virtual machines. If your environment uses multi-tiered applications, you will discover why vApp is the perfect container for multi-tiered applications. How to take advantage of virtual machine availability and load balancing will also be discussed.
Troubleshooting vSphere storage
Virtualization has created a new role within IT departments everywhere; the vSphere administrator. vSphere administrators have long been managing more than just the hypervisor, they have quickly had to adapt to become a ‘jack of all trades’ in organizations. More and more tier 1 workloads are being virtualized, making the infrastructure underneath them all that more important. Due to this, along with the holistic nature of vSphere, administrators are forced to have the know-how on what to do when problems occur. This practical, easy-to-understand guide will give the vSphere administrator the knowledge and skill set they need in order to identify, troubleshoot, and solve issues that relate to storage visibility, storage performance, and storage capacity in a vSphere environment. This book will first give you the fundamental background knowledge of storage and virtualization. From there, you will explore the tools and techniques that you can use to troubleshoot common storage issues in today’s data centers. You will learn the steps to take when storage seems slow, or there is limited availability of storage. The book will go over the most common storage transport such as Fibre Channel, iSCSI, and NFS, and explain what to do when you can’t see your storage, where to look when your storage is experiencing performance issues, and how to react when you reach capacity. You will also learn about the tools that ESXi contains to help you with this, and how to identify key issues within the many vSphere logfiles.
Microsoft DirectAccess best practices and troubleshooting
DirectAccess is an amazing Microsoft technology that is truly the evolution of VPN; any Microsoft-centric shop needs this technology. DirectAccess is an automatic remote access solution that takes care of everything from planning to deployment. Microsoft DirectAccess Best Practices and Troubleshooting will provide you with the precise steps you need to take for the very best possible implementation of DirectAccess in your network. You will find answers to some of the most frequently asked questions from administrators and explore unique troubleshooting scenarios that you will want to understand in case they happen to you. Microsoft DirectAccess Best Practices and Troubleshooting outlines best practices for configuring DirectAccess in any network. You will learn how to configure Manage Out capabilities to plan, administer, and deploy DirectAccess client computers from inside the corporate network. You will also learn about a couple of the lesser-known capabilities within a DirectAccess environment and the log information that is available on the client machines. This book also focuses on some specific cases that portray unique or interesting troubleshooting scenarios that DirectAccess administrators may encounter. By describing the problem, the symptoms, and the fixes to these problems, the reader will be able to gain a deeper understanding of the way DirectAccess works and why these external influences are important to the overall solution.