SlideShare a Scribd company logo
1 of 110
Windows 7: Client Performance
Jeff Stokes, Premier Field Engineer
FY12
2
Microsoft Confidential
Jeff Stokes is a Premier Field Engineer (4 years) with Microsoft (5 years). 19 years industry
experience.
Blogs at http://blogs.technet.com/b/jeff_stokes/
LinkedIn @ http://www.linkedin.com/in/jeffstokes
About the Presenter
Table of Contents
Client Performance, why it matters
Tools
Task Manager
– Resource Monitor
Perfmon Data Collector Sets
Event Logs and Reliability
Monitor
Sysinternals Tools
Windows Performance Toolkit
Network Stack Tracing
Troubleshooting
4
Microsoft Confidential
Client Performance – Why it matters
Troubleshooting
Tips and Tricks and Tools
Task Manager and
Resource Monitor
Everything you need to know quickly gauge
System Performance
7
Microsoft Confidential
Task Manager and Resource Monitor
What are we looking at?
• Running Applications
• Running Processes
• System Performance
• Network Performance
• User Session Status
• Service States
8
Microsoft Confidential
Task Manager and Resource Monitor
Applications - New Option!
Create Dump File
Creates a dump file at:
C:Users%username%AppDataLocalTemp
Semi-disruptive dump creation
Leaves process intact
9
Microsoft Confidential
Task Manager and Resource Monitor
Processes - New Options!
Open File Location (where was this run from)
Debug (for Visual Studio JIT debugging)
UAC Virtualization (for app compat)
Create Dump File
Creates a dump file at:
C:Users%username%AppDataLocalTemp
Semi-disruptive dump creation
Leaves process intact
10
Microsoft Confidential
Task Manager and Resource Monitor
Processes - New Column Options!
Memory – Working Set
Memory – Peak Working Set
Handles
Threads
11
Microsoft Confidential
Task Manager and Resource Monitor
Performance Tab, a look back at the past
“PF Usage”…
NOTHING to do
With the page file
NOR Paging Rate
Commit Charge (K)
What does this
mean?
12
Microsoft Confidential
Task Manager and Resource Monitor
Performance Tab, a look at the now
Memory
Answers the immortal -
“How much memory am I using?”
13
Microsoft Confidential
Task Manager and Resource Monitor
Networking
Utilization by interface graph
Easy to view enumeration
14
Microsoft Confidential
Task Manager and Resource Monitor
Users
Answers the questions:
Who is logged in?
Where are they logged in from?
Lets us disconnect (or logoff) their sessions.
15
Microsoft Confidential
Task Manager and Resource Monitor
Resource Monitor – Where? Accessible via the Task Manager Performance Tab
And then clicking the “Resource Monitor” button
Or
Start “Resource Monitor” and enter
16
Microsoft Confidential
Task Manager and Resource Monitor
Resource Monitor – Overview
“System Dashboard”
Deep data available on each
tab following Overview
17
Microsoft Confidential
Task Manager and Resource Monitor
Resource Monitor – CPU
CPU Usage Total
CPU Frequency
CPU by Process
What Handles?
What Modules?
18
Microsoft Confidential
Task Manager and Resource Monitor
Resource Monitor – Memory
“My system is slow, I need more MEMORY!”
How much each system is consuming in RAM, What does our Physical Memory Map look like?
19
Microsoft Confidential
Task Manager and Resource Monitor
Resource Monitor – Disk
Disk Usage, By Process. Answers the question “What does my process experience with
regards to disk performance?”
20
Microsoft Confidential
Task Manager and Resource Monitor
Resource Monitor – Network
Network Usage
By Process!
What does the process
experience in Latency?
Does the Firewall Interfere
OR
Filter the traffic of my process?
Perfmon Data Collector Sets
System Reporting Built-In!
22
Microsoft Confidential
Performance Monitor – System Data Collector Sets
How do we get to them?
23
Microsoft Confidential
Performance Monitor – System Data Collector Sets
What do they do?
The System Diagnostics Data Collector Set is
an excellent triage method to find out what the
Operating System thinks is wrong with the
System.
It is comprised of an ETL trace of NT Kernel,
many registry key and WMI queries, and a
Performance Monitor collection.
The data collector runs for 60 seconds and then
generates a report in the reports section.
To start one, right click and select “Run”
24
Microsoft Confidential
Performance Monitor – System Data Collector Sets
What do they report?
They analyze the system for issues.
CPU Load, Memory, Disk, Network.
Is the Hard Drive failing SMART?
What version of BIOS?
Failed Drivers?
Event Logs and Reliability Monitor
History and Patterns
26
Microsoft Confidential
Event Logs and Reliability Monitor
What’s new?
What’s new in 7 for Event Logs?
A lot.
We now log the 100 series of events.
In these events, we clock boot time.
And 200 series events clock shut
down time.
27
Microsoft Confidential
Event Logs and Reliability Monitor
What’s new?
Group Policy now has an
Operational Event Log.
Each GPO processed logs an
Event. No more guessing on cost
of Group Policy Processing!
28
Microsoft Confidential
Event Logs and Reliability Monitor
What’s new?
• Stricter Guidelines for Event Log information
• More meaningful to you
• Log Files now use the Event Viewer
• Previously, many log files in many formats
• XML Format
• Customizable Views
• Easier to organize
• Advanced Filtering
• Get to the relevant data more quickly
• No More Log Size Restrictions
• Limited only by disk space
• Admins can now subscribe to events on remote systems
29
Microsoft Confidential
Event Logs and Reliability Monitor
What’s new?
Scope Pane
Action Pane
View Pane
Sysinternals Tools
What to use when
31
Microsoft Confidential
Sysinternals Tools
What to use when
32
Microsoft Confidential
Sysinternals Tools
What to use when
33
Microsoft Confidential
Sysinternals Tools
What to use when
34
Microsoft Confidential
Sysinternals Tools
What to use when
35
Microsoft Confidential
Sysinternals Tools
What to use when
Windows Performance Toolkit
Xperf and its uses
37
Microsoft Confidential
Windows Performance Toolkit
Xperf
Xperf is a general reference to the collection of tools that make up the
Windows Performance Analysis toolset (WPA). These tools are disturbed
publicly as part of the Windows Performance Toolkit (WPT). The 3 main
components of the “Xperf kit” are:
XPERF.EXE Command line tracing tool
XPERFVIEW.EXE Visual trace analysis tool
XBOOTMGR.EXE Boot trace capture tool
We’ll take each tool for a test drive in a moment, but let’s explore the past and
what’s under the hood.
38
Microsoft Confidential
Windows Performance Toolkit
Xperf
By leveraging the power of the ETW model, we can capture metrics previously
unavailable outside of a debugger/instrumented code environment.
With this level of granularity, we can capture metrics like….
• All processes and threads in user mode and kernel mode
• Deferred procedure calls (DPCs) and interrupt service requests (ISRs)
• Scheduling
• Disk and file I/O
• Memory
• Network
It also helps analyze what the customer experiences:
• Catch the problem as it happens
• Capture anywhere, decode anywhere
• Integration with symbols
39
Microsoft Confidential
Windows Performance Toolkit
Xperf
So what does that all mean? Well… it means we can use a single tool to
tackle many of the most common problems for customers:
• Troubleshooting application behavior – High CPU, Handles, Etc.
• Gathers both usermode and kernel events at the same time
• Benchmark disk performance (or lack there of)
• Get a deep view into the entire boot/shutdown lifecycle
XPERF is incredibly powerful and can be leveraged for a wide range of
issues customers and engineers face daily.
42
Microsoft Confidential
Windows Performance Toolkit
BootVis (Xperf Predecessor)
43
Microsoft Confidential
Windows Performance Toolkit
Xperf
44
Microsoft Confidential
Windows Performance Toolkit
Xperf
45
Microsoft Confidential
Windows Performance Toolkit
Xperf
46
Microsoft Confidential
Windows Performance Toolkit
Xperf
Prefetch is functional
But
ReadyBoot is not
47
Microsoft Confidential
Windows Performance Toolkit
Xperf
Are we fragmented? A bit, the map above is a view of the disk head ‘hits’ over time
Red lines are the disk flushes
48
Microsoft Confidential
Windows Performance Toolkit
Xperf – Internet Explorer
49
Microsoft Confidential
Windows Performance Toolkit
Xperf - Demos
jDemo 1. Slower than expected logon for an engineering workstation.
Demo 2. Slower than expected boot times.
Demo 3. Slower than expected boot and logon times.
Demo 4. Slow boot on an SSD.
Demo 5. Slow boot and logon and post logon.
Network Stack Tracing
Netmon…sort of
51
Microsoft Confidential
Network Stack Tracing
Netsh
52
Microsoft Confidential
Network Stack Tracing
Netsh
53
Microsoft Confidential
Troubleshooting
Tools, Tips and Tricks new to 7
55
Microsoft Confidential
Troubleshooting
Action Center
• The Action Center combines alerts from these Windows 7
features:
• Windows Update
• User Account Control (UAC)
• Security Center
• Backup and Restore
• Problem Reports and Solutions
• Windows Defender
• Diagnostics
• Network Access Protection (NAP)
• Recovery
56
Microsoft Confidential
Troubleshooting
Action Center - Alerts
• May not appear
• May appear with just white flag
• Red X means important issues
57
Microsoft Confidential
Troubleshooting
Action Center - Settings
58
Microsoft Confidential
Troubleshooting
Action Center
59
Microsoft Confidential
Troubleshooting
Security
• The Security section of the Action Center Contains:
• Various configuration tasks for:
• Common tasks
• Most Important security configuration settings of the Windows 7
installation
60
Microsoft Confidential
Troubleshooting
Maintenance
• Action items and message for:
• Unreported Items
• Backup
• Windows Updates
• Troubleshooting and System Maintenance
61
Microsoft Confidential
Troubleshooting
Windows Troubleshooting Platform
• Reduce number of support calls
• Reduce MPI (minutes per incident)
• Make support calls more efficient
• Increase customer satisfaction
• Use well-known methods
• Address configuration issues
• Fix problems when we are certain
• Collect data when we are not
62
Microsoft Confidential
Troubleshooting
Windows Troubleshooting Wizard
63
Microsoft Confidential
Troubleshooting
Platform Components
• Windows Troubleshooting Packs
• Windows Troubleshooting Engine
• Windows Troubleshooting Wizard
• Many built into everyday processes:
(Examples: flush cache, reset NIC, renew IP)
64
Microsoft Confidential
• Troubleshooting
• Resolution
• Verification
Troubleshooting
Process
65
Microsoft Confidential
Troubleshooting
Built-in Troubleshooting Packs
• Desktop Experience
• Device
• Media Player
• Network
• Performance
• Power
*Based on top support call
categories
• Printing
• Programs
• Sound
• System
• Web Browser
• Windows
66
Microsoft Confidential
Click Start and type Trouble in the Search Box:
Troubleshooting
Built-in Troubleshooting Packs
Click View All:
67
Microsoft Confidential
Troubleshooting
List of Troubleshooters
68
Microsoft Confidential
Troubleshooting
Open a Troubleshooter
69
Microsoft Confidential
Troubleshooting
Problem Steps Recorder, Why?
Challenges
• Reproducing problems
• Inability to diagnose problems and root causes
Solution
• Users can record steps taken when an issue occurs, giving help desk screen
shots and comments
• Enables Help Desks to easily and more efficiently diagnose problems
70
Microsoft Confidential
Troubleshooting
PSR, Have your user click start and type “problem steps”
Or Just
“PSR”
Only 3 functions for
simplicity
71
Microsoft Confidential
Troubleshooting
Problem Steps Recorder
• Takes a screenshot each time a mouse is clicked
• Or when a new function happens inside an application
• Mouse clicks generate a small red spot over the pointer
• Optionally users can add comments after each step:
• When finished a zip file is created – user can send this to the helpdesk
72
Microsoft Confidential
Troubleshooting
Problem Steps Recorder
73
Microsoft Confidential
Troubleshooting
Problem Steps Recorder
74
Microsoft Confidential
Troubleshooting
Problem Steps Recorder - Additional Details Pane
75
Microsoft Confidential
• Based on Windows PE
• Command line tool useful in troubleshooting
• Installed automatically by Windows 7
• Launched directly from Hard Drive or Windows 7 Setup Disc
• Benefits include:
• Reduced support through auto repair of common root causes
• Automatically launches if Windows fails to boot
– This may be a call you would get
• Startup Repair Tool: Automatically corrects common unbootable
Windows scenarios
Troubleshooting
Windows Recovery Environment (WinRE)
76
Microsoft Confidential
System Recovery Options provide access to the following tools:
Startup Repair
System Restore
System Image Recovery
Windows Memory Diagnostics
Command Prompt
Troubleshooting
Windows Recovery Environment (WinRE)
77
Microsoft Confidential
Accessing from install media
Troubleshooting
Windows Recovery Environment (WinRE)
78
Microsoft Confidential
Accessing from F8
Troubleshooting
Windows Recovery Environment (WinRE)
79
Microsoft Confidential
Troubleshooting
System Recovery Options
80
Microsoft Confidential
Troubleshooting
Startup Repair attempts to repair
• Registry corruption
• Missing or damaged system and driver files
• Disk metadata corruption (MBR, partition table, and boot sector)
• File system metadata corruption
• Installation of problematic or incompatible drivers
• Installation of incompatible Windows service packs and patches
• Corrupt boot configuration data
• Bad memory and hard disk hardware (detection only)
81
Microsoft Confidential
Troubleshooting
Startup Repair attempts to repair
• Malfunctioning firmware and other hardware components
• Problems with clean Windows installations or Windows upgrades (for
example, from Windows XP to Windows Vista)
• Windows logon errors
• Viruses and malicious software
• LOGS: %WINDIR%System32LogFilesSrtSrtTrail.txt
82
Microsoft Confidential
Troubleshooting
System Restore
• Return Windows to an earlier
configuration.
• Windows 7 automatically captures
system states prior to new drivers
or applications are installed
• Startup Repair will also use this tool automatically so it may not be
necessary to ever click this link
• Great for malware infections:
• Removes startup calls – not the EXE’s directly
83
Microsoft Confidential
Troubleshooting
Tools (in WinRE) you’re less likely to use
• System Image Recovery would be valid if you weren’t using a
standardized image
• Windows Memory Diagnostic:
usually the hardware vendor has
their own tools
• Command Prompt:
This may be helpful from time
to time – it just gives you
access to the system from a
CLI
84
Microsoft Confidential
Troubleshooting
Msconfig (System Configuration)
• Start -> msconfig (in search)
85
Microsoft Confidential
Troubleshooting
Msconfig (System Configuration)
• Change the next boot-up options
• Great if the user is having trouble with the F8 key
86
Microsoft Confidential
Troubleshooting
Msconfig (System Configuration)
• Disable all non-Microsoft services
• Good troubleshooting tool to baseline, then re-enable 1 at a time
87
Microsoft Confidential
Troubleshooting
Msconfig (System Configuration)
• Disable all startup items
• These are non-service automatic start-up programs
88
Microsoft Confidential
Troubleshooting
Msconfig (System Configuration)
• Great one-stop-shop for many helpful tools
89
Microsoft Confidential
Troubleshooting
Run-As is Back!
• Hold down the shift key
• Then right-click a program icon
• Select Run as different user
• Notice I use msconfig in the
example:
• Any programs launched within
the program will be under these
credentials
• All msconfig tools would
automatically be elevated
• Works great with CMD also
90
Microsoft Confidential
Troubleshooting
Boot.ini is gone
• Still managed from startup
and recovery
• Replaced with BCD (Boot
Configuration Database)
• Supports EFI (Extensible
Firmware Interface) and
Legacy BIOS
*This does not mean NTLDR & MBR
are retired, still can be used on
PC/AT BIOS. Adds Bootmgr, Winload,
& Winresume – beyond the scope of
this class
http://msdn.microsoft.com/en-us/windows/hardware/gg463059.aspx
91
Microsoft Confidential
Troubleshooting
Msinfo32 – System Information
92
Microsoft Confidential
Troubleshooting
Whoami – hostname – set us
• Quickly identify who/what you are working with
93
Microsoft Confidential
Troubleshooting
How many clicks does it take… to get to the NICs?
1.
2.
3.
OR:
Just type
NCPA.CPL
(Network Control
Panel Applet)
94
Microsoft Confidential
Troubleshooting
Accessing your users’ desktops
• Communicator/LiveMeeting | Windows Remote Assistance
95
Microsoft Confidential
Troubleshooting
Accessing your users’ desktops
96
Microsoft Confidential
Troubleshooting
Windows Remote Assistance
97
Microsoft Confidential
Troubleshooting
Windows Remote Assistance
Helpdesk
End User
98
Microsoft Confidential
Troubleshooting
Windows Remote Assistance
Helpdesk
End User
99
Microsoft Confidential
Troubleshooting
Windows Remote Assistance
100
Microsoft Confidential
Troubleshooting
Broken Internet Explorer
Accessible even if IE is not
101
Microsoft Confidential
Troubleshooting
Broken Internet Explorer
102
Microsoft Confidential
Troubleshooting
Broken Internet Explorer
103
Microsoft Confidential
Troubleshooting
Network - PathPing
• Troubleshoot routing issues (similar to tracert)
104
Microsoft Confidential
Troubleshooting
Network - PathPing
• Does individual analysis of each “hop” in the route
105
Microsoft Confidential
Troubleshooting
Driver Problems
106
Microsoft Confidential
Troubleshooting
Driver Problems
When using Device Driver Roll Back, be aware of the following
limitations:
• You cannot roll back beyond one driver version. For example, you
cannot revert to the second-to-the-last version of a driver.
• You cannot roll back printer drivers.
• You cannot roll back drivers for all functions of a multifunction
device simultaneously. You must roll back each driver separately.
For example, if you have a multifunction device that provides
audio and modem functionality, you must roll back the modem
driver and the audio driver separately.
• You cannot uninstall a driver by using Device Driver Roll Back.
(You must use the Uninstall feature in Device Manager to do
this.)
107
Microsoft Confidential
Troubleshooting
System File Checker
• SFC /scannow
• Useful if you are able to log into the computer
• Boot into Windows Recovery Environment (WinRE)
• Select command prompt
• Type the following command:
• sfc /scannow /offbootdir=c: /offwindir=c:windows
• (assumes C is the drive where Windows files are located)
• Performs an offline SFC operation
108
Microsoft Confidential
Troubleshooting
Last Known Good
109
Microsoft Confidential
Troubleshooting
Last Known Good
• Troubleshooting which policy a user is/is not being affected by –
available by typing RSOP from an elevated CMD
110
Microsoft Confidential
Troubleshooting
RSOP
• Lists “final outcome” of all policies (remember LSD-OU)
111
Microsoft Confidential
Troubleshooting
System Control (SC)
• Helpful if you can’t get to the services.msc (malware, etc)
• Usage (query, start, stop, pause, or end services)
• Examples:
• sc query | more
• Lists services, halts per page, ctrl+c to stop when you find the
service you’re looking for
• sc stop audiosrv
• Stops the “Windows Audio” service
• sc start audiosrv
• Starts the “Windows Audio” service
112
Microsoft Confidential
Windows checks to see if the name is cached (TTL)
Use “ipconfig /flushdns” to flush out existing cache
Windows checks the hosts file for entries
Windows checks with the DNS server for entries
Windows tries NetBIOS name resolution
The target computer may not have registered their IP in DNS, may need to use “ipconfig
/registerdns”
Troubleshooting
Name Resolution

More Related Content

What's hot

Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Concentrated Technology
 
VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...
VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...
VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...Unidesk Corporation
 
Virtual deep dive-xendesktop_stephanpfister
Virtual deep dive-xendesktop_stephanpfisterVirtual deep dive-xendesktop_stephanpfister
Virtual deep dive-xendesktop_stephanpfisterDigicomp Academy AG
 
VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3
VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3
VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3Digicomp Academy AG
 
Vmware thin app architecture
Vmware thin app architectureVmware thin app architecture
Vmware thin app architecturesolarisyougood
 
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the HoodVMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the HoodVMworld
 
Horizon view technical deep dive
Horizon view   technical deep diveHorizon view   technical deep dive
Horizon view technical deep diveMurugesan Arumugam
 
VMware ThinApp 4.5
VMware ThinApp 4.5VMware ThinApp 4.5
VMware ThinApp 4.5netlogix
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Louis Göhl
 
Presentation citrix desktop virtualization
Presentation   citrix desktop virtualizationPresentation   citrix desktop virtualization
Presentation citrix desktop virtualizationxKinAnx
 
Citrix Day 2014: XenApp / XenDesktop 7.6
Citrix Day 2014: XenApp / XenDesktop 7.6Citrix Day 2014: XenApp / XenDesktop 7.6
Citrix Day 2014: XenApp / XenDesktop 7.6Digicomp Academy AG
 
SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...
SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...
SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...Roel van Bueren
 
Microsoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private CloudMicrosoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private CloudMd Yousup Faruqu
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?Digicomp Academy AG
 
APP-V 5.0 Service Pack 3, виртуализация Microsoft Office
APP-V 5.0 Service Pack 3, виртуализация Microsoft OfficeAPP-V 5.0 Service Pack 3, виртуализация Microsoft Office
APP-V 5.0 Service Pack 3, виртуализация Microsoft OfficeВиталий Стародубцев
 

What's hot (19)

Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0
 
VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...
VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...
VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...
 
Virtualization today
Virtualization todayVirtualization today
Virtualization today
 
Deployment day session 4 deployment using sccm
Deployment day session 4 deployment using sccmDeployment day session 4 deployment using sccm
Deployment day session 4 deployment using sccm
 
Virtual deep dive-xendesktop_stephanpfister
Virtual deep dive-xendesktop_stephanpfisterVirtual deep dive-xendesktop_stephanpfister
Virtual deep dive-xendesktop_stephanpfister
 
VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3
VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3
VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3
 
Vmware thin app architecture
Vmware thin app architectureVmware thin app architecture
Vmware thin app architecture
 
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the HoodVMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
 
Horizon view technical deep dive
Horizon view   technical deep diveHorizon view   technical deep dive
Horizon view technical deep dive
 
Vdi in-a-box
Vdi in-a-boxVdi in-a-box
Vdi in-a-box
 
VMware ThinApp 4.5
VMware ThinApp 4.5VMware ThinApp 4.5
VMware ThinApp 4.5
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]
 
Presentation citrix desktop virtualization
Presentation   citrix desktop virtualizationPresentation   citrix desktop virtualization
Presentation citrix desktop virtualization
 
Citrix Day 2014: XenApp / XenDesktop 7.6
Citrix Day 2014: XenApp / XenDesktop 7.6Citrix Day 2014: XenApp / XenDesktop 7.6
Citrix Day 2014: XenApp / XenDesktop 7.6
 
SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...
SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...
SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...
 
Microsoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private CloudMicrosoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private Cloud
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
 
APP-V 5.0 Service Pack 3, виртуализация Microsoft Office
APP-V 5.0 Service Pack 3, виртуализация Microsoft OfficeAPP-V 5.0 Service Pack 3, виртуализация Microsoft Office
APP-V 5.0 Service Pack 3, виртуализация Microsoft Office
 
Sna lab prj (1)
Sna lab prj (1)Sna lab prj (1)
Sna lab prj (1)
 

Similar to Windows 7 client performance talk - Jeff Stokes

Honorable Squires
Honorable SquiresHonorable Squires
Honorable SquiresESUG
 
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingLesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingGene Carboni
 
Windows 7 – Application Compatibility Toolkit 5.5 Overview
Windows 7 – Application Compatibility Toolkit 5.5 OverviewWindows 7 – Application Compatibility Toolkit 5.5 Overview
Windows 7 – Application Compatibility Toolkit 5.5 OverviewVijay Raj
 
Defects mining in exchanges - medvedev, klimakov, yamkovi
Defects mining in exchanges - medvedev, klimakov, yamkoviDefects mining in exchanges - medvedev, klimakov, yamkovi
Defects mining in exchanges - medvedev, klimakov, yamkoviDataFest Tbilisi
 
Operating System & Utility Programme
Operating System & Utility ProgrammeOperating System & Utility Programme
Operating System & Utility Programmebbp2067
 
Performance monitoring - Adoniram Mishra, Rupesh Dubey, ThoughtWorks
Performance monitoring - Adoniram Mishra, Rupesh Dubey, ThoughtWorksPerformance monitoring - Adoniram Mishra, Rupesh Dubey, ThoughtWorks
Performance monitoring - Adoniram Mishra, Rupesh Dubey, ThoughtWorksThoughtworks
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxPoornimaGhodke3
 
Os rtos.ppt
Os rtos.pptOs rtos.ppt
Os rtos.pptrahul km
 
Application Of A Server Hardening Essay
Application Of A Server Hardening EssayApplication Of A Server Hardening Essay
Application Of A Server Hardening EssayWinstina Kennedy
 
The Pc And Its Operating Systems
The Pc And Its Operating SystemsThe Pc And Its Operating Systems
The Pc And Its Operating SystemsAmber Wheeler
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
Adventures in Observability - Clickhouse and Instana
Adventures in Observability - Clickhouse and InstanaAdventures in Observability - Clickhouse and Instana
Adventures in Observability - Clickhouse and InstanaMarcel Birkner
 
Adventures in Observability: How in-house ClickHouse deployment enabled Inst...
 Adventures in Observability: How in-house ClickHouse deployment enabled Inst... Adventures in Observability: How in-house ClickHouse deployment enabled Inst...
Adventures in Observability: How in-house ClickHouse deployment enabled Inst...Altinity Ltd
 
Computer system and it class 1
Computer system and it class 1Computer system and it class 1
Computer system and it class 1Sajib Mahmood
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized DesktopKeith Combs
 
2018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 42018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 4FRSecure
 
Intro to open source telemetry linux con 2016
Intro to open source telemetry   linux con 2016Intro to open source telemetry   linux con 2016
Intro to open source telemetry linux con 2016Matthew Broberg
 
Introduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary MargaratIntroduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary MargaratMary Margarat
 

Similar to Windows 7 client performance talk - Jeff Stokes (20)

Honorable Squires
Honorable SquiresHonorable Squires
Honorable Squires
 
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingLesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and Protecting
 
Windows 7 – Application Compatibility Toolkit 5.5 Overview
Windows 7 – Application Compatibility Toolkit 5.5 OverviewWindows 7 – Application Compatibility Toolkit 5.5 Overview
Windows 7 – Application Compatibility Toolkit 5.5 Overview
 
Defects mining in exchanges - medvedev, klimakov, yamkovi
Defects mining in exchanges - medvedev, klimakov, yamkoviDefects mining in exchanges - medvedev, klimakov, yamkovi
Defects mining in exchanges - medvedev, klimakov, yamkovi
 
Operating System & Utility Programme
Operating System & Utility ProgrammeOperating System & Utility Programme
Operating System & Utility Programme
 
Performance monitoring - Adoniram Mishra, Rupesh Dubey, ThoughtWorks
Performance monitoring - Adoniram Mishra, Rupesh Dubey, ThoughtWorksPerformance monitoring - Adoniram Mishra, Rupesh Dubey, ThoughtWorks
Performance monitoring - Adoniram Mishra, Rupesh Dubey, ThoughtWorks
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
 
Os rtos.ppt
Os rtos.pptOs rtos.ppt
Os rtos.ppt
 
Compyter system softwere
Compyter system softwereCompyter system softwere
Compyter system softwere
 
Application Of A Server Hardening Essay
Application Of A Server Hardening EssayApplication Of A Server Hardening Essay
Application Of A Server Hardening Essay
 
The Pc And Its Operating Systems
The Pc And Its Operating SystemsThe Pc And Its Operating Systems
The Pc And Its Operating Systems
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Adventures in Observability - Clickhouse and Instana
Adventures in Observability - Clickhouse and InstanaAdventures in Observability - Clickhouse and Instana
Adventures in Observability - Clickhouse and Instana
 
Adventures in Observability: How in-house ClickHouse deployment enabled Inst...
 Adventures in Observability: How in-house ClickHouse deployment enabled Inst... Adventures in Observability: How in-house ClickHouse deployment enabled Inst...
Adventures in Observability: How in-house ClickHouse deployment enabled Inst...
 
Computer system and it class 1
Computer system and it class 1Computer system and it class 1
Computer system and it class 1
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized Desktop
 
2018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 42018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 4
 
Intro to open source telemetry linux con 2016
Intro to open source telemetry   linux con 2016Intro to open source telemetry   linux con 2016
Intro to open source telemetry linux con 2016
 
Week 6
Week 6Week 6
Week 6
 
Introduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary MargaratIntroduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary Margarat
 

More from Jeff Stokes

Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff StokesTmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff StokesJeff Stokes
 
Tmh02 vdi image_optimization_and_troubleshooting - Jeff Stokes
Tmh02 vdi image_optimization_and_troubleshooting - Jeff StokesTmh02 vdi image_optimization_and_troubleshooting - Jeff Stokes
Tmh02 vdi image_optimization_and_troubleshooting - Jeff StokesJeff Stokes
 
Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesJeff Stokes
 
Sustainability in Infrastructure Design - Jeff Stokes
Sustainability in Infrastructure Design - Jeff StokesSustainability in Infrastructure Design - Jeff Stokes
Sustainability in Infrastructure Design - Jeff StokesJeff Stokes
 
Crouching Admin, Hidden User
Crouching Admin, Hidden UserCrouching Admin, Hidden User
Crouching Admin, Hidden UserJeff Stokes
 

More from Jeff Stokes (6)

Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff StokesTmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
 
Tmh02 vdi image_optimization_and_troubleshooting - Jeff Stokes
Tmh02 vdi image_optimization_and_troubleshooting - Jeff StokesTmh02 vdi image_optimization_and_troubleshooting - Jeff Stokes
Tmh02 vdi image_optimization_and_troubleshooting - Jeff Stokes
 
Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff Stokes
 
Sustainability in Infrastructure Design - Jeff Stokes
Sustainability in Infrastructure Design - Jeff StokesSustainability in Infrastructure Design - Jeff Stokes
Sustainability in Infrastructure Design - Jeff Stokes
 
Walking deck
Walking deckWalking deck
Walking deck
 
Crouching Admin, Hidden User
Crouching Admin, Hidden UserCrouching Admin, Hidden User
Crouching Admin, Hidden User
 

Recently uploaded

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 

Windows 7 client performance talk - Jeff Stokes

Editor's Notes

  1. I’m a guy
  2. Here is what I will be reviewing in this presentation.
  3. The Windows Client for end users IS the entire environment. The end user does not typically perceive bandwidth limitations, slow performance of a server, third party add-ins or tools, or problems in the image itself. Every performance issue in the environment therefore comes down to a client performance (or build) critique. Because of this end user experience focus (and the consumerization of IT) the client system tends to become the focus of vast and complex troubleshooting efforts. In some environments, the adoption of new technology is completely halted due to perceived performance issues experienced by key end users. New technology brings with it expectations of performance gains, ease of use, etc. Upgrading the client and leaving old technology in the back end can bring forward performance problems from the old build to the new. Giving the end user the impression that nothing has changed with their new shiny machine.
  4. Debug - http://msdn.microsoft.com/en-us/library/ms455354.aspx UAC Virtualization - http://blogs.msdn.com/b/uac/archive/2006/02/22/537129.aspx
  5. Memory – Working Set: Working Set is the current size, in bytes, of the Working Set of this process. The Working Set is the set of memory pages touched recently by the threads in the process. If free memory in the computer is above a threshold, pages are left in the Working Set of a process even if they are not in use. When free memory falls below a threshold, pages are trimmed from Working Sets. If they are needed they will then be soft-faulted back into the Working Set before leaving main memory. Memory – Peak Working Set: Working Set Peak is the maximum size, in bytes, of the Working Set of this process at any point in time. The Working Set is the set of memory pages touched recently by the threads in the process. If free memory in the computer is above a threshold, pages are left in the Working Set of a process even if they are not in use. When free memory falls below a threshold, pages are trimmed from Working Sets. If they are needed they will then be soft-faulted back into the Working Set before they leave main memory. Handles: The total number of handles currently open by this process. This number is equal to the sum of the handles currently open by each thread in this process. Threads: The number of threads currently active in this process. An instruction is the basic unit of execution in a processor, and a thread is the object that executes instructions. Every running process has at least one thread.
  6. This system has 20179 MB in “Standby Memory”. Adding additional RAM to the system will not provide a most positive performance experience at this time…