monthly newsletter

The below extract is taken from September's monthly newsletter authored by Scott Lowe.

'I'll start by saying that I'm a fan of both vSphere and Hyper-V. Both have a place in the world. With the release of Windows Server 2012 has come Hyper-V Server 2012 along with a whole lot of incorrect information making its way around the Internet.

Perhaps most glaring is the constant stream of complaints on Twitter that Virtual Machine Manager (VMM) 2012 can't manage Hyper-V Server 2012 unless you use the beta for VMM 2012 SP1, which adds support for Hyper-V Server 2012. Many are pointing to that fact as if it's a joke. After all, if you can't manage Hyper-V Server 2012 without resorting to a beta, then what good is it? There's just one catch: The information is incorrect. While it's true that you do need VMM 2012 SP1 beta to manage Hyper-V 2012, you don't need VMM at all to perform most common hypervisor functions including Live Migration, Storage Live Migration, Hyper-V Replica and more.'

Subscribe to Monthly Newsletter here -

George Chetcuti

Published by
George Chetcuti

Recent Posts

Hardware RAID vs. software RAID: Pros and cons for each

RAID is a technique to virtualize independent disks into arrays for improved performance. Should you…

3 days ago

After the plague: What IT will look like in a post-COVID-19 world

COVID-19 has changed everything, but once it disappears, we will not go back to how…

3 days ago

Solved: Outlook defaults to Microsoft 365 version with Exchange server

An Exchange server with a hybrid connection to Microsoft 365 is usually pretty seamless —…

4 days ago

How chatbots are changing the way teams communicate internally

Chatots are primarily thought of as consumer-facing solutions. They bring life to customer interactions by…

4 days ago

Hakbit ransomware campaign targeting specific European countries

The newly uncovered Hakbit ransomware campaign spread via spear-phishing emails may indicate a shift in…

4 days ago

Credential stuffing: Everything you need to know to avoid being a victim

Credential stuffing is yet another weapon being used by cybercriminals. Here’s what credential stuffing is…

5 days ago