Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

Imaging and Virtualization

Home Forums Virtualization Other Virtualization Products and Issues Imaging and Virtualization

Viewing 1 post (of 1 total)
  • Author
    Posts

  • redwingasia
    Member
    #161887

    Hello everyone im new hear to the forums. But not new to Petri. This place has been great. But I got a problem that google makes it really hard to find the answer and was looking for some quick answers.

    What I got is a terminal server on a windows 2003 at a remote location. What I need to accomplish is to move the computers OS not the computer. I have been looking into imaging software but all I have found makes images for the same piece of hardware. What I need is an complete image of the OS but it need to work on a completely different piece of hardware.

    Anyone have had any experiences with this. I have done images before but not like this and usually they are for the same piece of hardware. This case it not the same piece of hardware.

    Last question. More of a poll really. I am new to the virtualization world but have messed around with a few. What is a really good system for virtualization? I know of CITRIX and VMware. And now I am see Hyper V for server 2008 but what I have read Hyper V is only for 2008. Feed back on this would be greatly appreciated.

    Thank you for all the feed back on my issues.

    PS Didnt know which section to slap this thing in.

Viewing 1 post (of 1 total)

You must be logged in to reply to this topic.

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: