blog header
Subscribe via: (Email / RSS)


Managing and Optimizing VMware vSphere Deployments
Author- Managing and Optimizing VMware vSphere Deployments
I am very excited to announce that my book, Managing and Optimizing VMware vSphere Deployments was published in August, 2012! In Managing and Optimizing VMware vSphere Deployments, my co-author, Sean Crookston, and I offer start-to-finish lessons for vSphere planning, implementation, operation, management, and troubleshooting: expert insights drawn from our “in-the-trenches” consulting experience.

Coverage includes:
• Building a strong foundation for virtual infrastructure: design considerations and best practices
• Smoothly integrating vSphere 5 into current environments and considerations
• Establishing a more stable infrastructure
• Choosing hardware and making optimal configuration decisions
• Transforming your VMware design from blueprint to completion
• Operating vSphere solutions more efficiently on a day-to-day basis
• Automating tasks and maximizing availability
• Streamlining the installation of updates, patches, and upgrades
• Forecasting and planning capacity on an ongoing basis to support growth
• Overcoming roadblocks on the journey to 100% virtualization
• Monitoring vSphere 5 with tools provided by VMware and its community
• Discovering the most valuable and current online VMware resources
• Examples using Cisco Unified Computing System (UCS) are provided throughout the book

Pro Hyper-V
Author- Pro Hyper-V
My book, Pro Hyper-V was published in May, 2009! This book takes you through a comprehensive technical journey through Microsoft’s new bare-metal hypervisor. Learn how to:

- Manage Hyper-V with SCVMM 2008 and PowerShell

- Enable role-based access in Hyper-V by utilizing Authorization Manager and WMI.

- Set up a Hyper-V Failover Cluster using the new Windows Server 2008 Failover Clustering.

- Backup and Recover Hyper-V virtual machines using built-in tools, Windows Server Backup, or Data Protection Manager 2007.

– And Much More…

I have also written articles for,, and I answer virtualization questions for I was also the technical editor for Virtualization: From the Desktop to the Enterprise. More information on my writing can be seen by looking at my Writing Category Archive. A partial list of publications and editing work is below.

Technical Editor- Virtualization: From Desktop to the Enterprise

-I was the technical editor for Chris Wolf and Erik Halter’s book on virtualization technology.

-This book was listed on Intel Corporations Fall 2006 Recommended Reading List.

-It covers aspects of virtualization, such as storage virtualization, server clustering, and machine virtualization.

Author- Article: VMware and Moka5 server virtualization for SMBs

-In this four-part article, I go over some technology from Moka5. They are a small startup that is doing some very interesting things with vmware player and virtual machine streaming.

Author- Article: Virtualization opportunities for Citrix resellers

-In this article I go over the Citrix Desktop Broker for Presentation Server and how this technology compliments, instead of competes, with VMWare’s Virtual Desktop Infrastructure (VDI).

Author- Article: Running Windows as a VM on Linux with VMWare Server

-In this article I present a how-to on running windows applications as “windows” on an Ubuntu Linux desktop by using VMWare Server, 2X application server, and Windows XP.

Author- Five-Part Article Series: Improving Microsoft Virtual Server Security

-In this series of articles I go through securing Microsoft Virtual Server R2. Some highlights include:

Part I: Securing local access to the host

-Learn about securing local access to the host, including file and folder security.

Part II: Securing remote access to the host

-Learn about securing remote access to the host, including the Virtual Machine Remote Console (VMRC) and the IIS Administration page.

Part III: Virtual machine log file monitoring

-Learn about virtual machine log file monitoring (which events to monitor). Also, use a vbscript to back up event logs and clear them routinely.

Part IV: Examining the compromised Virtual Server 2005 host

-Learn what to examine if a host machine is compromised. Also, learn how to use some Sysinternals tools and some scripting to collect valuable information from the compromised host.

Part V: Preventing and detecting rogue virtual machines

-Learn how to detect rogue virtual machines on your network. Also, learn how a malicious user could hide a virtual machine in an NTFS alternate data stream!

Author- Article: Implementing a server virtualization pilot

-Learn about some considerations that need to be made when taking on a server virtualization project. This includes considerations for virtualization targets, storage choices, and server capacity planning.

Author- Article: Virtualization and Disaster Recovery Planning

-In this three-section article, learn how storage virtualization (iSCSI), Ardence, and server virtualization technology can be combined to create a flexible production and disaster recovery environment.

{ 1 trackback }

Managing and Optimizing VMware vSphere Deployments Released!
August 2, 2012 at 5:59 pm

{ 1 comment… read it below or add one }

escafandra autónoma May 2, 2013 at 11:53 pm

Hey! Would you mind if I share your blog with my facebook group?
There’s a lot of folks that I think would really appreciate your content. Please let me know. Thanks

Leave a Comment