background preloader

Virtualisation

Facebook Twitter

Welcome to xen.org, home of the Xen® hypervisor, the powerful open source industry standard for virtualization. Community Projects. Tools. Introduction à Maven 2. Maven est un outil open-source de build pour les projets Java très populaire, conçu pour supprimer les tâches difficiles du processus de build. Maven utilise une approche déclarative, où le contenu et la structure du projet sont décrits, plutôt qu'une approche par tâche utilisée par exemple par Ant ou les fichiers make traditionnels. Cela aide à mettre en place des standards de développements au niveau d'une société et réduit le temps nécessaire pour écrire et maintenir les scripts de build.

L'approche déclarative, basée sur le cycle de vie du projet et utilisée par Maven 1, est pour beaucoup un changement radical par rapport aux techniques de build traditionnelles, et Maven 2 va encore plus loin dans cette optique. Dans cet article, je m'intéresse aux principes basiques derrières Maven 2 puis passe à un exemple concret. Commençons par voir les fondamentaux de Maven 2. Le coeur d'un projet Maven 2 est le modèle objet projet (appelé POM pour project object model).

Blabla   C'est tout! Configuration locale d'un SCM. Upload Log in Sign up Browse Books Biography & MemoirBusiness & EconomicsCookingFantasyFiction & LiteratureHistoryHobbies, Crafts, & HomeMysteryRomanceSocial ScienceTravelYoung Adult & Children's Other Content BrochuresCourt FilingsCreative WritingLegal formsInstruction manualsMapsGraphic ArtPresentationsRecipes/MenusSchool Work Welcome to Scribd, the world's digital library.

Download Standard view Full view of 48 Add note Save to My Library Sync to mobile Look up keyword or section Like this Share on social networks 3Activity There was a problem sending you an sms. To get Scribd mobile enter your number and we'll send you a link to the Scribd app for iPhone & Android. We've sent a link to the Scribd app.

Text me We'll never share your phone number. iTunes App Store | Google Play Store Share to your social networks. Tweet Embed Table Of Contents Exemple d'un fichier pom.xml Configuration du proxy Utilisation des SNAPSHOT Activation du profil Structure par défaut d'un projet Maven Compilation avec JDK 1.5 0 of . 1. VirtualBox : Les fichiers de disques durs virtuels (VDI) Ces fichiers à quoi correspondent-ils ? Tout simplement à un disque dur physique, que l'on rattache à un contrôleur virtuel dans VirtualBox. Différents contrôleurs virtuels existent. Serial ATA (SATA/AHCI) : les derniers-nés des contrôleurs de stockage, qui contrairement à leur prédécesseur IDE n'imposent aucune restriction quant au nombre de périphériques qui peuvent leur être rattachés.

De plus ils sont Hot-plug et permettent d'ajouter/supprimer des disques à chaud sans éteindre le système d'exploitation. Ils peuvent être configurés en mode AHCI ou Advanced Host Controller compatibility mode ou en mode de compatibilité IDE (pour les OS ne supportant pas le AHCI). Les contrôleurs SATA fonctionnent plus vite, consomment moins de ressources et le nombre maximum de disques virtuels en SATA supportés par Virtualbox est de 30. IDE (ATA) : les contrôleurs ATA ont fait leur apparition dans les années 80. En résumé IDE : 4 périphériques dont 1 CD-Rom. Lequel choisir ? Aiqus: the ai & cs learning community. About. How to use the Virtualization Lab (I)

I finished last post on this series with a fully working cluster installed between two Hyper-V virtual machines (VM) using a virtual iSCSI solution installed on a Virtual Box VM as depicted in the next picture: Before moving on in the process of adding complexity to the lab scenario, don't forget to safeguard your work; although this just a lab, it doesn't reduce the nuisance of having to reinstall everything in the event of any failure . So, create VM snapshots: And setup and execute some 2008 SQL Server backup options: In order to prepare my setup for the next steps I installed a second NIC on my desktop PC, to overcome the limitations of trying to use two simultaneous bridge connections over a single physical NIC, and expanded the size of the iSCSI target used by SQL Server just to be on the safe side before installing databases on it.

The iSCSI target expansion can be made without stopping the service. I double the size of the disk used by the clustered SQL 2008 to 10 Gb. How to Setup a Virtualization Lab (I) Now that I have concluded a general overview of most of the theory related to High Availability and Virtualization it is time to start testing some of those concepts and see them in action.

My goal for the next posts is to produce a series of tutorials showing how anyone can easily install a handful of virtual machines and be able to explore the wonderful possibilities provided by this technology. I will be using an old laptop powered by a Turion 64 X2 CPU with a 250 Gb SSD HD and 4 Gb of RAM combined with a desktop running Windows 7 Ultimate on a Athlon 64 X2 4800+ with 4 Gb of RAM and lots a free disk space scattered through 3 SATA hard drives. Virtual Machines Creation I will not go through the details of OS installation because I am assuming the ones reading these tutorials are way passed that. I started by installing a fresh copy of Windows Server 2008 R2 SP1 Standard on a secondary partition in my laptop. Then it was time to start setting things inside Hyper-V. Virtualization (II) When we think of network virtualization, we always think of VLANs but there is much more to network virtualization than just VLANs.

Network virtualization is when all of the separate resources of a network are combined, allowing the administrator to share them out amongst the users of the network. Thus, it is a method of combining the available resources in a network by splitting up the available bandwidth into channels, each of which is independent from the others, and each of which can be assigned (or reassigned) to a particular server or device in real time. This allows each user to access all of the network resources from their computer either they are files and folders on the computer, printers or hard drives etc.

The theory behind network virtualization is to take many of the traditional client/server based services and put them "on the network". One network vendor actually has a working card that is inserted into a router. Network virtualization is a versatile technology.