Saturday, December 21, 2013

New Certification - VMware Certified Advanced Professional – Desktop Administration (VCAP-DTA)

VMware has released a new exam, the VCAP-DTA certification validates your advanced proficiency with deploying, administering, and troubleshooting large-scale, production ready, virtual desktop infrastructures that enable workforce mobility. It also demonstrates your ability to: 

Install and manage highly-available and recoverable Horizon View environmentsEstablish policies and settings for a secure virtualized infrastructure Troubleshoot configuration and performance issue in complex Horizon View environments 

VCAP-DTA Links:

Program OverviewExam BlueprintVCAP CommunityHorizon View Instructional VideosExam Registration

Thursday, December 19, 2013

Free e-learning course - Virtualizing Microsoft Exchange 2013 on VMware vSphere 5 Fundamentals

This self paced free eLearning course illustrates why organizations need to consider virtualizing Exchange 2013 on VMware vSphere. This course focuses on Exchange design prerequisites and considerations, when virtualizing Exchange 2013.

It also describes design, sizing, and implementation guidelines and best practices, that should be followed as part of a structured design and implementation methodology.

The course consists of three modules:

Introduction to Virtualizing Microsoft Exchange 2013 provides an overview of the challenges that organizations typically face when deploying Microsoft Exchange 2013 on physical hardware, and how these challenges can be addressed by virtualizing Exchange on VMware vSphere. This module also describes the benefits that organizations can realize by virtualizing Exchange 2013 on the vSphere platform.Designing the Virtualized Exchange Environment evaluates the prerequisites for designing an Exchange 2013 solution when deployed in a virtualized environment. This module also covers the design considerations and guidelines for designing and sizing Exchange 2013 on vSphere.Implementing the Virtualized Exchange Solution covers various implementation options that should be considered when virtualizing Exchange 2013 on the vSphere platform. This module also discusses several implementation considerations that should be factored into an Exchange 2013 design. Finally, this module discusses how to monitor and test the performance of Exchange 2013 on VMware vSphere.

Virtualizing Microsoft Exchange 2013 on VMware vSphere [V5.X] Fundamentals

Friday, December 13, 2013

Don’t be held hostage by the IT expert

What happens when IT changes direction or reorganizes and an expert suddenly feels threatened? If an organization has relied heavily on a particular individual, can he hold it hostage?
Every IT department has its technical experts--whether their specialty is data base, communications, or a particular application or system that is unique.

Over time, these individuals hone their skills to make them "one of a kind" problem solvers and also consummate advisers on new IT projects.

These individuals often develop their technical skills because early in their IT careers, they recognize that they don't have a taste for management--so they must find some other way to advance themselves and their earning potential.

The best of these experts is a six-figure/year employee--who can even out-earn his manager.

What happens, though, when IT changes direction or reorganizes and an expert suddenly feels threatened? If an organization has relied heavily on a particular individual, can he hold it hostage? And if he does, what do you do?

First, the best antidote to any situation like this is to have an open, supportive and communicative culture in your organization. When an organization is in the midst of layoffs and constant closed-door meetings, no one, even the most experienced technical people, feels secure. If they are far away from management, they are also likely to feel that their knowledge is all that they have to protect themselves from being pushed out the door. Consequently, even if you are an IT manager who is faced with having to reduce staff, do it as openly as you can and also provide career placement (or even in-company transfer) support to those affected.

Second, management and staff succession planning should be part of your disaster recovery plan's risk management for critical employees who become unavailable. A system of cross training and "understudy" education to ensure that you have backups for all IT positions—including the CIO—facilitates this. If cross-training and understudy activities are integrally part of your everyday practices and they are uniformly applied to the CIO on down, there is likely to be less staff anxiety.

Third, learn how to "bite the bullet" when a key IT contributor becomes uncooperative and protective of his knowledge base. This lack of cooperation can affect department work. NO ONE, including the CIO, should obstruct getting the work out that IT is responsible for.

Some years ago, I was managing a mission-critical project that entailed the development of an online stock trading system. I needed the services of a transaction processing expert for the system software we were running applications on. The individual I wanted for the project was absolutely brilliant in her field—but she proved to be uncooperative and unwilling to work on the project. I didn't wait around. Instead, I brought in a much more junior person for the project. We got the work done that was needed, although it took longer. Nevertheless, the project was successful, the junior person learned valuable skills that would be used again--and we had avoided being "held hostage" by an uncooperative employee.

When I talk with CIOs, it always surprises me how few include contingency planning for critical technical personnel in their DR plans. Instead, personnel contingency plans focus on replacements for management people in the event they become unavailable in a disaster. The reality is that key technical contributors are just as important as managers--and sometimes more so--when it comes down to the IT work that must be done.

"We changed our IT culture significantly to one of service, and we realigned departments within our organization several years ago," said one financial services CIO. "The process was necessary, but in reorganizing, I also knew that I was risking losing key technical contributors who didn't want to be part of a cross-disciplinary service culture, but who instead preferred to operate in their traditional technical expertise silos."

The CIO's worst fears came true when several of his top six-figure experts opted to leave for other companies that had organizations that they were more comfortable with.

What was the CIO's saving grace?

"I had anticipated and included the loss of key technical contributors in my risk management strategy, had discussed it with my management and had obtained their buyoff. I was ready to move in with a temporary staff of outside IT consultants until we could rehire for the positions," he said.

Today, the organization is back on its feet with a strong in-house IT staff, and a new service orientation that is taking it to new heights

Original Post:
http://feedly.com/k/1hR7foi

Wednesday, December 11, 2013

VMware NSX Network Virtualization Design Guide

IT organizations have gained significant benefits as a direct result of server virtualization. Server consolidation reduced physical complexity, increased operational efficiency, and the ability to dynamically re-purpose underlying resources to quickly and optimally meet the needs of increasingly dynamic business applications are just a handful of the gains that have already been realized.

Now, VMware's Software Defined Data Center (SDDC) architecture is extending virtualization technologies across the entire physical data center infrastructure. VMware NSX, the network virtualization platform is a key product in the SDDC architecture. With NSX, virtualization now delivers for networking what it has already delivered for compute and storage.

In much the same way that server virtualization programmatically creates, snapshots, deletes and restores software-based virtual machines (VMs), NSX network virtualization programmatically creates, snapshots, deletes, and restores software-based virtual networks. The result is a completely transformative approach to networking that not only enables data center managers to achieve orders of magnitude better agility and economics, but also allows for a vastly simplified operational model for the underlying physical network.

With the ability to be deployed on any IP network, including both existing traditional networking models and next generation fabric architectures from any vendor, NSX is a completely non-disruptive solution. In fact, with NSX, the physical network infrastructure you already have is all you need to deploy a software defined data center. 

Download the VMware NSX Network Virtualization Design Guide.

This document is targeted toward virtualization and network architects interested in deploying VMware network virtualization solutions.

Tuesday, December 3, 2013

Free e-learning course - VMware ThinApp Fundamentals

ThinApp Fundamentals is a free e-learning self-paced course that provides you with an overview of VMware ThinApp features and concepts, technical requirements and installation steps, and how to use the ThinApp Setup Capture wizard to virtualize applications. You will also learn how to deploy VMware ThinApp applications to end users as well as learn basic troubleshooting techniques.

The course consists of four modules:

1) VMware ThinApp Features and Concepts focuses on The App's features and benefits, the ThinApp architecture, and common use cases.
2) Capturing Applications discusses the technical requirements and steps for installing ThinApp and how to use the ThinApp Setup Capture wizard to virtualize applications.
3) Deploying and Updating Applications provides an overview of how to test, deploy, and update ThinApp virtual applications.
4) Basic Troubleshooting covers common issues that may occur when using ThinApp virtual applications and troubleshooting tools and recommendations.

Register here