Top Eight Features in Windows Server 8 - Slide 7

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Top Eight Features in Windows Server 8-7 Next

Unlike the pseudo-live migration Hyper-V found in Windows Server 2008 R2, Windows Server 8 can now perform multiple concurrent live migrations with zero downtime. Underlying virtual machine (VM) files are also seamlessly transferred between server hosts, without the need for expensive shared storage infrastructure such as a SAN. The enhanced live migration is of significance as it translates into the ability for even SMBs to build a private cloud without incurring additional hardware (SAN) or software (ESX Server) costs. For instance, administrators can move VMs across physical machines during office hours to facilitate software patching or the upgrade of server hardware without incurring any downtime.

Microsoft's upcoming Windows Server 8 has started gaining some prominence since the software giant previewed it at the BUILD conference. Its cloud-based paradigm and focus on large-scale deployments is self-evident, and at least one executive from Microsoft has called Windows Server 8 "the most cloud-optimized OS" developed by the Redmond-based company.

For now, its availability as a developer preview on MSDN means that various in-depth assessments of its capabilities are starting to roll in. It is clear even at this early stage that the next server operating system from Microsoft is a technically sophisticated one, and crammed with capabilities that bring many previously enterprise-only capabilities to small and mid-sized businesses.

This slideshow highlights some of the top features businesses can expect from Windows Server 8.

More Slideshows:

Password Misuse Could be the Root Cause of Hacking SpikePassword chaos amongst IT staff and apathy about password security amongst their senior management is creating a security nightmare.

The Six Dumbest Hacks of All Time While hackers can be dangerous, not every hacker is a Kevin Mitnick.

Seven Tips to Protect Your Google WalletEven with Google Wallet's built-in identity theft protections, you still need to be wary of hackers.


Related Topics : Server Operating Systems, Apache, Linux Kernel, Solaris, UNIX

More Slideshows

How to Maintain Operations During a Regional Disaster

While not a substitute for a comprehensive incident management plan, this checklist provides a concise overview of key areas to address. ...  More >>

Fifteen Top Paying IT Certifications for 2012 Fifteen Top Paying IT Certifications for 2012

A closer look at the most popular certifications and their associated pay....  More >>

Top 10 Myths About IPv6 Top 10 Myths About IPv6

WildPackets takes a closer look at 10 myths and set the record straight about this enigmatic protocol....  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.