Top Eight Features in Windows Server 8 - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Top Eight Features in Windows Server 8-4 Next

Storage Pools and Storage Spaces are two new storage abstraction technologies that complement each other to dramatically improve the storage handling capabilities of Windows Server 8. Storage pools essentially aggregate the physical storage capacity of disparate hard disk drives into a single storage space. No special hardware is required, and new disks can be dynamically added to bolster storage capacity. On its part, storage spaces let an administrator create virtual disks with specific levels of resilience. Similar to traditional RAID, data protection levels can be configured to none, mirror or parity, thin provisioning-like abilities mean that the virtual disks can be configured to be larger than the available space in a storage pool.

Microsoft's upcoming Windows Server 8 has started gaining some prominence since the software giant previewed it at the BUILD conference. Its cloud-based paradigm and focus on large-scale deployments is self-evident, and at least one executive from Microsoft has called Windows Server 8 "the most cloud-optimized OS" developed by the Redmond-based company.

For now, its availability as a developer preview on MSDN means that various in-depth assessments of its capabilities are starting to roll in. It is clear even at this early stage that the next server operating system from Microsoft is a technically sophisticated one, and crammed with capabilities that bring many previously enterprise-only capabilities to small and mid-sized businesses.

This slideshow highlights some of the top features businesses can expect from Windows Server 8.

More Slideshows:


Password Misuse Could be the Root Cause of Hacking SpikePassword chaos amongst IT staff and apathy about password security amongst their senior management is creating a security nightmare.

The Six Dumbest Hacks of All Time While hackers can be dangerous, not every hacker is a Kevin Mitnick.

Seven Tips to Protect Your Google WalletEven with Google Wallet's built-in identity theft protections, you still need to be wary of hackers.

 

Related Topics : Server Operating Systems, Apache, Linux Kernel, Solaris, UNIX

 
More Slideshows

How to Maintain Operations During a Regional Disaster

While not a substitute for a comprehensive incident management plan, this checklist provides a concise overview of key areas to address. ...  More >>

Fifteen Top Paying IT Certifications for 2012 Fifteen Top Paying IT Certifications for 2012

A closer look at the most popular certifications and their associated pay....  More >>

Top 10 Myths About IPv6 Top 10 Myths About IPv6

WildPackets takes a closer look at 10 myths and set the record straight about this enigmatic protocol....  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.