Đang chuẩn bị liên kết để tải về tài liệu:
SQL Server 2008 Hyber V Unleashed - p 8

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

50 2 Best Practices at Planning, Prototyping, Migrating, and Deploying Windows Ser ver 2008 Hyper-V input about areas of concern related to the application (known “quirks” of the application relative to specific service packs not supported, or hard-coded IP addresses in the application, or the like). Key end users can reveal needs that their managers or directors aren’t aware of, especially in organizations with less-effective IT management or unstable infrastructures. Special attention should be paid to ferreting out the problem areas and technologies that never worked right or have proven to be unstable. After all, they likely won’t mysteriously be fixed when migrating. | 50 2 Best Practices at Planning Prototyping Migrating and Deploying Windows Server 2008 Hyper-V input about areas of concern related to the application known quirks of the application relative to specific service packs not supported or hard-coded IP addresses in the application or the like . Key end users can reveal needs that their managers or directors aren t aware of especially in organizations with less-effective IT management or unstable infrastructures. Special attention should be paid to ferreting out the problem areas and technologies that never worked right or have proven to be unstable. After all they likely won t mysteriously be fixed when migrating them from physical to virtual configurations. For the most part the bigger the project the more thorough the discovery should be. For projects involving a complete upgrade or system replacement every affected device and application should to be reviewed and evaluated to help determine its role in the new environment. If network diagrams exist they should be reviewed to make sure they are current and contain enough information such as server names roles applications managed switches routers firewalls and so on to fully define the location and function of each infrastructure device. If additional documentation exists on the detailed configuration of key infrastructure devices such as as-built server documents with details about the server hardware and software configurations or details about router configurations or firewalls they should be dusted off and reviewed. Information such as whether patches and fixes have been applied to servers and software applications becomes important in the design process. In some cases the desktop configurations need to be inventoried if client changes are required by an application upgrade. Software inventory tools can save many hours of work in these cases. Certain documented company policies and procedures that are in place need to be reviewed. Some such as disaster-recovery

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.