Introduction to Storage Area Network (SAN) -Part1

Posted in Uncategorized on October 4, 2011 by minasamirus
As we all know Information is the basic Asset for any Company . It is the currency of business as we may say  . So to ensure That business delivers the expected results they must have access to accurate information and without delay. Here come The SAN which has been regarded as the ultimate responses to all these need.

The Major Subjects That Ringed the Storage precedence 

1-Infrastructure Simplification: Consolidation(many servers in one server) ,Virtualization,Automated Management
2-information lifecycle Management : Managing data through lifecycle to conception until  Disposal in a manner that optimizes storage and lower The cost
3-Buisness Continuity: Maintaining access to data all the times and protecting Critical data

4-The increase of amount of data used by 60% per year Makes the SAN enters the arena

SO What is SAN ?

SANs are the leading storage infrastructure for the
global economy of today. SANs offer simplified storage management, scalability,
flexibility, availability, and improved data access, movement, and backup.
The storage Network Industry Association (SNIA) Defines The SAN as any Network whose primary purpose is to transfer data between computer  systems and storage elements . So it is not as people always think that SAN must be a Fiber it can be Ethernet if its primary purpose to provide access to storage Elements is also considered SAN. Also SAN are sometimes  used for system interconnection in clusters to increase the computing power.
A SAN can also be the whole storage system which consists of storage elements Storage Devices, Computer Systems , all control software , communicating over the Network.
SAN can use routers, gateways, hubs , switches and directors to allow any device to any device connection across the network as it eliminates the traditional connection between the server and the storage. So SAN can be local or extended over geographical distances.

SAN enables many servers to share a common storage utility, which may comprise many storage devices including disk, tape, Optical Storage and the storage utility may be located far from the servers that use it.

There are 3 ways SAN uses in data Transfer
1-Server to storage : Many servers access same storage
2-Server to Server: SAN for high High-speed , High volume communication between Servers .
3-Storage to Storage : This the best Technique in data transfers as you don’t need server intervention in backing up the data or when a remote device mirroring is done across the SAN.

We will stop  at this part and Continue in Part2

Mina Samir fahmy
Associate infrastructure Associate at Ingazat information Technology
Twitter : @Eng_Minasamir

Desktop Virtualization overview

Posted in Uncategorized on September 15, 2011 by minasamirus

This article is my first article about Desktop Virtualization i used some info from and Their latest webcast by John Fanelli (Vice President, Product Marketing, Enterprise desktop, Citrix Systems,Inc)

When you enter the business of IT and Infrastructure you will found out that your target is  to get in the head of the CEO of any company, you need to know what he needs , his priorities , also his vision ,then you start thinking how can i satisfies him how i can grow up his business through IT, How can i help him, So as we speaking here are the most common priorities for any CEO:
1-Opening New branch office
2-Attracting New Employees
3-Aquiring New Companies
4-Outsourcing Key IT
Their big problem is to expand Their IT infrastructure and to buy new hardware .Also They face a lot of problems linking their branches.


Why Traditional Desktop Can’t address Their Priorities

1-      Complex on-site Infrastructure
2-      Limited workspace flexibility
3-      Move, Adds, Change Can Take Weeks
4-      Hard to secure Distributed Assets: Since Most of Clients is now laptops so you can’t secure moving client like this.
After the social Media Revolution and the Smart phones, Tablets Revolution New Generation Of workers have come up:
1-Uses Web based applications.
2-Have New Expectation of how IT can look like.
3-Have the concept of bringing your own computer.
4-Expecting Certain User Experience


Consumerization : it all starts with the Device, the user is expecting something different from what he experienced in the device he uses also cons. Note that:
1-These Devices are Mobile
2-They can connect from any where
3-The User Experience on this Devices is great ,Touches ,the gestures,swipes ex..
Consumerization is not all about hardware it is about the service the user use.File storage on the cloud is a service highly used nowadays because it is so easy and user think it is secure
Also user is now getting used to self Service like going to ATM machine and using his CARD to cash out money he don’t need help anymore.The most important thing to him now is the service he needs a service he goes online and search for it and subscribe and begin use it and this puts the load on IT stuff who need to meet the user Expectation.
Traditional desktops is complex ,Inflexible,hard to secure.
In the mean Time IT has This user stack to take care of. And has a lot of Problems Maintaining and  Making This stack stable at all time.
So at Desktop Virtualization we do some changes with this stack we move it to the admin side and now Admins Deliver the Fresh OS combined with the users preferences and Applications.
It is a win-win situation for the IT and the users .Now it is easy for IT to Maintain and control Desktops and it is easy for Users to go Mobile and have their own Choice.

IT can update, Secure, Change, move Desktops easily in their data center Environment.

Summing Up why to Go Virtual!!?
1-Virtual is Simpler, Faster, Secure.
2-Enable Virtual Work-styles.
3-Leverage The latest Mobile Devices
4-Rabildly adapt the business change
5-Transform computer Computing
When you come to real market implementation of Desktop Virtualization you find out Great result:
“We believe we are one of the first, if not the first, bank to run a virtualized trading floor. Feedback from both traders and non-traders on performance and usability has been outstanding”     —Group senior level Executive – Leading Global bank
“With Citrix Desktop Virtualization, we were able to get 25000 new employees from an acquisition up-and-running on more than 20 financial applications in a single day”
–senior Director of technical service
Some Results and Benefits gained from Using DV in real business:

1-Deliever Rich Desktop virtualization and integrated business Critical Multimedia collaboration tools.
2-Overall Energy Consumption Reduction of 55%
3-Enabling Secure desktop delivery to mobile devices including IPads.
4-Achieving Windows7 compatibility for legacy applications.
5-Accelerated Key business processes from hours to Minutes.
6-Ensuring Seamless continuity of any service.
Hope you enjoyed My first Article and I will post part 2 so soon.
Mina Samir Fahmy
Associate Consultant @ Ingazat Information Technology

Continue reading

Enabling Enhanced Presence Privacy Mode in Lync 2010

Posted in Uncategorized on January 20, 2011 by Karim Hamdy

Here is a nice trick in Lync Server 2010 , with Enhanced Presence Privacy Mode on in Lync 2010 , users can restrict their presence information to people in their contact list only.

here is how to do it :

  1. Open Lync Server 2010 Management Shell.
  2. Run the following command:
    Get-CsPrivacyConfiguration | Set-CsPrivacyConfiguration -EnablePrivacyMode $True

However in a Migration/Coexistence scenario this setting apply only to Lync users, not OCS users so be ware of this.

That’s it folks ! see you next time 🙂

Moving your Lync Server 2010 CMS to Another Server

Posted in Uncategorized on January 6, 2011 by Karim Hamdy

While I was working in a lab, I wanted to deploy another Frontend Server, move CMS and decommission the old Frontend; however there are some steps you must follow to accomplish

  1. From the Topology Builder Create New FE and publish
  2. Install your new front end server
  3. Move Conference Directory to the other frontend server by running the following PS Command : Get-CsConferenceDirectory | Move-CsConferenceDirectory -TargetPool
  4. verify that you have used local setup to run the Prepare Standard Edition server option to install CMS SQLRTC instance
  5. Run the following PS command to install the CMS database Install-CSDatabase -CentralManagementDatabase -SqlServerFqdn -SqlInstanceName rtc
  6. Run Enable-CsTopology
  7. Run the following PS command Move-CsManagementServer it will search for available pools and provide you with options to move the CMS
  8. In case of Disaster recovery run the following PS Command Move-CsManagementServer -ConfigurationFileName “C:\CsConfiguration.xml” -LisConfigurationFileName “C:\CsLisConfiguration.xml” –Force Where the LisConfigurationFileName is previously saved E9-1-1 backup file (if you are using E9-11); and ConfigurationFileName is your previously saved configuration backup file.


How to Remove OCS 2007 R2 Users Information from AD

Posted in Uncategorized on January 4, 2011 by Karim Hamdy

so it’s been a long time since we posted anything here, but we are back active stay tuned with us, promise you will find interesting things here.

so you’ve decided to try Lync Server 2010. Good Call !! but the problem that you have old OCS 2007 R2 pilot and it was decommissioned long time ago and you have users still enabled or so their information says so in Active Directory.

you have to import Legacy Voice Policy from OCS 2007 R2 to Lync Side but the problem is there is no OCS gone with the wind. when you want to enable users for Lync 2010 and Lync still recognizes them as legacy users as Lync reads their information from AD, all you have to do is the following :

Open ADSIEdit , point to where your users reside , right click on your user and select properties and clear the following attributes :

also change the msRTCSIP-User Enabled to “Not Set”

That’s It !! now you are good to go to enable your users

Happy Lync 2010 !!

Exchange 2010 Storage Architecture – Level 300 – Arabic Session

Posted in Exchange Server on April 24, 2010 by Mahmoud Magdy

DPM agent installing Error 337

Posted in System Center with tags on April 7, 2010 by Ahmed Elnaggar

During  installing DPM agent on DOM client, you will may be facing the below error :-

Error 337: You cannot install the protection agent on server.domain.local because access to the computer has been denied

This error means that client is already protected by another DPM server. So, if you want to protect it with

The newer DPM server, you must firstly uninstall DPM agent from this client and then installing the new DPM agent

From the newer DPM server.

So, it means that any DPM client can’t be protected by more than one DPM server.