Top Eight Features in Windows Server 8 - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Top Eight Features in Windows Server 8-6 Next

In line with Microsoft's vision of a cloud-capable Windows Server, version 3 of Microsoft's Hyper-V virtualization engine is a significant step up in terms of its capabilities. For one, the inclusion of PowerShell support makes it possible to script virtual machines as part of administrative tasks. In addition, Microsoft has beefed up Hyper-V 3 to handle much larger workloads: Up to 160 logical processors with up to 2TB of memory are supported, while hosted VMs can access up to 32 virtual processors and 512GB of memory. NUMA (Non-Uniform Memory Access) also means that VMs scale very well with additional virtual processors and memory. Finally, the lifting of VM restrictions will allow as many VMs as supported by hardware to run.

Microsoft's upcoming Windows Server 8 has started gaining some prominence since the software giant previewed it at the BUILD conference. Its cloud-based paradigm and focus on large-scale deployments is self-evident, and at least one executive from Microsoft has called Windows Server 8 "the most cloud-optimized OS" developed by the Redmond-based company.

For now, its availability as a developer preview on MSDN means that various in-depth assessments of its capabilities are starting to roll in. It is clear even at this early stage that the next server operating system from Microsoft is a technically sophisticated one, and crammed with capabilities that bring many previously enterprise-only capabilities to small and mid-sized businesses.

This slideshow highlights some of the top features businesses can expect from Windows Server 8.

More Slideshows:


Password Misuse Could be the Root Cause of Hacking SpikePassword chaos amongst IT staff and apathy about password security amongst their senior management is creating a security nightmare.

The Six Dumbest Hacks of All Time While hackers can be dangerous, not every hacker is a Kevin Mitnick.

Seven Tips to Protect Your Google WalletEven with Google Wallet's built-in identity theft protections, you still need to be wary of hackers.

 

Related Topics : Server Operating Systems, Apache, Linux Kernel, Solaris, UNIX

 
More Slideshows

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

IoT challenges IoT: Top 7 Challenges

The IoT represents a unique set of challenges that pose a real threat to its utility as an engine of economic growth. Fortunately, the problems encountered so far are solvable, although it will probably take some time to determine exactly how to handle them and what level of optimization is needed for the multiple IoT services that are certain to arise. ...  More >>

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.