Top Eight Features in Windows Server 8 - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Top Eight Features in Windows Server 8-6 Next

In line with Microsoft's vision of a cloud-capable Windows Server, version 3 of Microsoft's Hyper-V virtualization engine is a significant step up in terms of its capabilities. For one, the inclusion of PowerShell support makes it possible to script virtual machines as part of administrative tasks. In addition, Microsoft has beefed up Hyper-V 3 to handle much larger workloads: Up to 160 logical processors with up to 2TB of memory are supported, while hosted VMs can access up to 32 virtual processors and 512GB of memory. NUMA (Non-Uniform Memory Access) also means that VMs scale very well with additional virtual processors and memory. Finally, the lifting of VM restrictions will allow as many VMs as supported by hardware to run.

Microsoft's upcoming Windows Server 8 has started gaining some prominence since the software giant previewed it at the BUILD conference. Its cloud-based paradigm and focus on large-scale deployments is self-evident, and at least one executive from Microsoft has called Windows Server 8 "the most cloud-optimized OS" developed by the Redmond-based company.

For now, its availability as a developer preview on MSDN means that various in-depth assessments of its capabilities are starting to roll in. It is clear even at this early stage that the next server operating system from Microsoft is a technically sophisticated one, and crammed with capabilities that bring many previously enterprise-only capabilities to small and mid-sized businesses.

This slideshow highlights some of the top features businesses can expect from Windows Server 8.

More Slideshows:

Password Misuse Could be the Root Cause of Hacking SpikePassword chaos amongst IT staff and apathy about password security amongst their senior management is creating a security nightmare.

The Six Dumbest Hacks of All Time While hackers can be dangerous, not every hacker is a Kevin Mitnick.

Seven Tips to Protect Your Google WalletEven with Google Wallet's built-in identity theft protections, you still need to be wary of hackers.


Related Topics : Server Operating Systems, Apache, Linux Kernel, Solaris, UNIX

More Slideshows

How to Maintain Operations During a Regional Disaster

While not a substitute for a comprehensive incident management plan, this checklist provides a concise overview of key areas to address. ...  More >>

Fifteen Top Paying IT Certifications for 2012 Fifteen Top Paying IT Certifications for 2012

A closer look at the most popular certifications and their associated pay....  More >>

Top 10 Myths About IPv6 Top 10 Myths About IPv6

WildPackets takes a closer look at 10 myths and set the record straight about this enigmatic protocol....  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.