Feeds

Server Virtualisation for real

11am today...set monitors to live

  • alert
  • submit to reddit

The essential guide to IT transformation

Webcast At 11am GMT today we’ve got some experts in our studio running through a real-life server virtualisation project.

You can watch them right here.

The plan for the one-hour event is to explore how a Virtualisation project can massively enhance your business, cut costs and generally make you something of a superhero in your organisation.

Reg host Tim Phillips is fronting the gig, joined by Reg reader Phil Morris from Chester Zoo who’s recently completed a major server virtualisation project. Chester Zoo doesn’t fit the image of ‘big corporate IT’ we might have when thinking about the sorts of organisations which are trialling and taking advantage of virtualisation technology. So we hope it’s going to be an interesting webcast for lots of you that are currently toying with the idea of server virtualisation.

Phil, with a little help from some analysts and an expert from Microsoft, will tell you how they did it - the planning, the implementation and the subsequent benefits they’ve gained.

The panel will also drill down into business and technology-related topics such as:

• Engaging with business: What does the IT-business relationship need to look like to take advantage of virtualisation, and is it a feasible proposition in smaller business environments where formal structure and resource are often more scarce?

• Managing the risks of provisioning: Long provisioning cycles are a challenge when it comes to wanting to do business better/faster. Areas such as change control and asset management for example become even more important to gain control over when virtualisation is in the mix.

• The role of automation: Although automation is not a new topic in IT, ‘automation in the virtual world’ is a slightly different proposition: there are fewer boundaries. The notion of moving from ‘1000 static servers’, to ‘a million virtual ones’ brings a requirement for new levels of automation and control than many organisations are familiar with today.

This isn’t a one-way broadcast - we’ll be taking questions from all of you that attend, so come prepared to get solutions to any of your outstanding challenges.

Remember also, if you can’t make it today you can register now and we’ll drop you a line as soon as this event is available ‘On Demand’ to watch at your leisure. ®

Boost IT visibility and business value

More from The Register

next story
Intel's Raspberry Pi rival Galileo can now run Windows
Behold the Internet of Things. Wintel Things
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
Linux kernel devs made to finger their dongles before contributing code
Two-factor auth enabled for Kernel.org repositories
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.