This sessions is intended for anyone who has to manage Windows Server 2008 R2. Windows Server 2008 R2 provide the automation platform and set of solutions that empower the administrators to optimize their server management experience. Windows PowerShell v2 and its built-in modules allow you to automate nearly any task for managing Windows Server. Be efficient, don't waste your time clicking through the GUIs, learn how to use Windows PowerShell, and move from repeated tasks to automated tasks.
Här har ni en presentation om WebSphere Application Server.
Titta närmare på området på dessa länkar: Application Infrastructure (http://www-03.ibm.com/software/products/sv/category/SW600) respektive Connectivity & Integration (http://www-03.ibm.com/software/products/sv/category/SW666).
WebSphere Application Server support and monitoring tools presentation by Royal Cyber, tuning methodology, installation, migration, clustering, troubleshooting, deployment, automation scripts and much more.
Using WebSphere MQ with WebSphere Application Server and the Liberty Profilet_quigly
Presentation looking at the integration architecture between WebSphere MQ and WebSphere Application Server and the Liberty Profile.
Also details WebSphere Application Server properties which you must be aware of in order to use Multi-Instance Queue Managers with WebSphere Application Server.
Här har ni en presentation om WebSphere Application Server.
Titta närmare på området på dessa länkar: Application Infrastructure (http://www-03.ibm.com/software/products/sv/category/SW600) respektive Connectivity & Integration (http://www-03.ibm.com/software/products/sv/category/SW666).
WebSphere Application Server support and monitoring tools presentation by Royal Cyber, tuning methodology, installation, migration, clustering, troubleshooting, deployment, automation scripts and much more.
Using WebSphere MQ with WebSphere Application Server and the Liberty Profilet_quigly
Presentation looking at the integration architecture between WebSphere MQ and WebSphere Application Server and the Liberty Profile.
Also details WebSphere Application Server properties which you must be aware of in order to use Multi-Instance Queue Managers with WebSphere Application Server.
Virtualization technologies - Windows Server 2008 R2 Hyper-Vsolsoft
Slides from Solsoft weekly webinar, Friday 18th March 2011
In this session we discussed:
Introduction to Hyper-V
Hyper-V Features
Licensing
High Availability
Benefits of System Centre Virtual Machine Manager
Integration of Hyper-V with SCVMM
Open Mic to discuss the new features related to Portal and Web Content Management introduced in version 8.5. We will be covering changes related to themes,
mobile, social integration and WCM changes related to syndication and rich media aspects of the new release.
AD109 - Using the IBM Sametime Proxy SDK: WebSphere Portal, IBM Connections -...Carl Tyler
From simple lightweight usage to full real world integration and development, the Sametime Proxy offers an exceptional range of social capabilities. This session will showcase our integration with Portal and Connections, and then move on to illustrate how the openness of the programming model makes it suitable for any environment, by extending SDK objects, managing events and overriding Sametime Proxy widget prototypes. This session will show you real world examples of how customers transformed regular web and mobile applications into those with a rich social experience using the Sametime Proxy
This presentation was presented at the Mobile World Congress in Barcelona, earlier this year. It has a strong Worklight illustration.
The presenters were as follows:
Leigh Williamson, IBM Distinguished Engineer
Miku Jha, Senior Solutions Architect
Johannes zu Eltz. Global Offerings Executive, IBM Mobile Enterprise Service
This presentation was given by Seema Kumar, Websphere Product Management and Surya V Duggirala, Websphere Performance Architect at IBM Impact 2012 at Mumbai on the 1st of June. It talks about Innovative Applications and Interactive Experiences
BP501 - Building and deploying custom IBM sametime connect client installatio...Carl Tyler
IBM Sametime Connect is a powerful unified communications client, offering real-time communications capabilities. In this session, we'll cover how to build custom IBM Sametime installation packages, how to include interim fixes in the installation. We'll also cover how to customize various aspects of the client install with the installer, and how to ensure the install and uninstall is configured correctly. We'll also explain how you can manage IBM Sametime settings from the server post installation.
Presented by Carl Tyler of Epilio at IBM Connection 2014
This presentation provide a view on the differences between WebSphere Application Server and Liberty Profile vs. competitive offerings, such as Apache Tomcat, Red Hat JBoss and Oracle WebLogic. It covers both the technical (feature/function) as well as cost considerations (TCA, TCO).
IBM WebSphere Application Server Update - Technical University (March 2015)Ian Robinson
IBM WebSphere Application Server Update - presented to the WebSphere Technical University (March 2015) by Ian Robinson, WebSphere Foundation Chief Architect.
An organization's need to serve up web-based applications has changed drastically over the past 16 years and are continuing to change. No other application server in the industry today provides the range of capabilities found in IBM WebSphere Application Server - from rapidly developed and deployed lightweight applications to highly available, highly scaled, continuously available enterprise applications. This session describes the revolution that has occurred to the fastest and most flexible AppServer to run in every cloud, and the direction in which it is going.
AAI-2075 Evolving an IBM WebSphere Topology to Manage a Changing WorkloaWASdev Community
Customers have a huge investment in WebSphere ND infrastructure including installation, development, deployment, management, support, and 3rd party products. At the same time there are significant new workloads. Mobile is driving very high transaction rates using new device types. New applications often require extremely fast response times. The Cloud economy based on Restful services is rapidly expanding the very nature of applications. Meanwhile, teams need to improve efficiency and drive higher density on their platforms.
In this session we will show you how to evolve your WebSphere ND environment to manage new workloads while preserving your existing investment. See how to add Liberty servers into ND. Explore how Intelligent Management and the ODR extend ND to support Restful services. Examine the benefits of a caching tier to improve response time and availability. See how to add Worklight into your ND environment to provide mobile device and application support. Explore continuous delivery and devOps options for WebSphere ND.
CIT-2697 - Customer Success Stories with IBM PureApplication SystemHendrik van Run
This IBM InterConnect 2015 session will cover a number of successful customer deployments of IBM PureApplication System. The described case studies include a variety of middleware platforms, as well as many additional operational requirements, like High Availability, Disaster Recovery, Enterprise Monitoring and more. Main focus is on giving a broad overview of what customers have done with the system and what the critical success factors were.
The session will provide an Introduction to PowerShell for IT professional to automate Windows Server 2008 and Windows Vista client administrative activities. The session will explore the features and capabilities of PowerShell, customer scenarios to manage day-to-day server and client administration activities, and Command Line syntax usage.
Virtualization technologies - Windows Server 2008 R2 Hyper-Vsolsoft
Slides from Solsoft weekly webinar, Friday 18th March 2011
In this session we discussed:
Introduction to Hyper-V
Hyper-V Features
Licensing
High Availability
Benefits of System Centre Virtual Machine Manager
Integration of Hyper-V with SCVMM
Open Mic to discuss the new features related to Portal and Web Content Management introduced in version 8.5. We will be covering changes related to themes,
mobile, social integration and WCM changes related to syndication and rich media aspects of the new release.
AD109 - Using the IBM Sametime Proxy SDK: WebSphere Portal, IBM Connections -...Carl Tyler
From simple lightweight usage to full real world integration and development, the Sametime Proxy offers an exceptional range of social capabilities. This session will showcase our integration with Portal and Connections, and then move on to illustrate how the openness of the programming model makes it suitable for any environment, by extending SDK objects, managing events and overriding Sametime Proxy widget prototypes. This session will show you real world examples of how customers transformed regular web and mobile applications into those with a rich social experience using the Sametime Proxy
This presentation was presented at the Mobile World Congress in Barcelona, earlier this year. It has a strong Worklight illustration.
The presenters were as follows:
Leigh Williamson, IBM Distinguished Engineer
Miku Jha, Senior Solutions Architect
Johannes zu Eltz. Global Offerings Executive, IBM Mobile Enterprise Service
This presentation was given by Seema Kumar, Websphere Product Management and Surya V Duggirala, Websphere Performance Architect at IBM Impact 2012 at Mumbai on the 1st of June. It talks about Innovative Applications and Interactive Experiences
BP501 - Building and deploying custom IBM sametime connect client installatio...Carl Tyler
IBM Sametime Connect is a powerful unified communications client, offering real-time communications capabilities. In this session, we'll cover how to build custom IBM Sametime installation packages, how to include interim fixes in the installation. We'll also cover how to customize various aspects of the client install with the installer, and how to ensure the install and uninstall is configured correctly. We'll also explain how you can manage IBM Sametime settings from the server post installation.
Presented by Carl Tyler of Epilio at IBM Connection 2014
This presentation provide a view on the differences between WebSphere Application Server and Liberty Profile vs. competitive offerings, such as Apache Tomcat, Red Hat JBoss and Oracle WebLogic. It covers both the technical (feature/function) as well as cost considerations (TCA, TCO).
IBM WebSphere Application Server Update - Technical University (March 2015)Ian Robinson
IBM WebSphere Application Server Update - presented to the WebSphere Technical University (March 2015) by Ian Robinson, WebSphere Foundation Chief Architect.
An organization's need to serve up web-based applications has changed drastically over the past 16 years and are continuing to change. No other application server in the industry today provides the range of capabilities found in IBM WebSphere Application Server - from rapidly developed and deployed lightweight applications to highly available, highly scaled, continuously available enterprise applications. This session describes the revolution that has occurred to the fastest and most flexible AppServer to run in every cloud, and the direction in which it is going.
AAI-2075 Evolving an IBM WebSphere Topology to Manage a Changing WorkloaWASdev Community
Customers have a huge investment in WebSphere ND infrastructure including installation, development, deployment, management, support, and 3rd party products. At the same time there are significant new workloads. Mobile is driving very high transaction rates using new device types. New applications often require extremely fast response times. The Cloud economy based on Restful services is rapidly expanding the very nature of applications. Meanwhile, teams need to improve efficiency and drive higher density on their platforms.
In this session we will show you how to evolve your WebSphere ND environment to manage new workloads while preserving your existing investment. See how to add Liberty servers into ND. Explore how Intelligent Management and the ODR extend ND to support Restful services. Examine the benefits of a caching tier to improve response time and availability. See how to add Worklight into your ND environment to provide mobile device and application support. Explore continuous delivery and devOps options for WebSphere ND.
CIT-2697 - Customer Success Stories with IBM PureApplication SystemHendrik van Run
This IBM InterConnect 2015 session will cover a number of successful customer deployments of IBM PureApplication System. The described case studies include a variety of middleware platforms, as well as many additional operational requirements, like High Availability, Disaster Recovery, Enterprise Monitoring and more. Main focus is on giving a broad overview of what customers have done with the system and what the critical success factors were.
The session will provide an Introduction to PowerShell for IT professional to automate Windows Server 2008 and Windows Vista client administrative activities. The session will explore the features and capabilities of PowerShell, customer scenarios to manage day-to-day server and client administration activities, and Command Line syntax usage.
Managing Web Infrastructure Systems With Windows Power Shell™ 2.0 90Microsoft TechNet
This session will explore how Windows Powershell v2.0 can automate administrative tasks to manage critical web infrastructure systems in the data center. The session will include topics on how to monitor and manage Windows Server 2008 systems. We will discuss how to use Windows Powershell cmdlets and WMI to retrieve local and remote information and execute tasks that can be performed on a daily basis. Then we will focus on how Windows Powershell can make it easier for IT Professionals to manage Active Directory to administer network accounts and publish shared folders. Next, we will explore how Windows Powershell Snap-in for IIS can be used to efficiently manage web servers in a web farm to decrease administrative overhead. Then we will show you how Windows Powershell snap-in included in SQL Server 2008 can make it easier for IT Professionals to administer backend databases.
System Center 2012 for VMware InfrastructureBryan Dady
Slides from a group presentation I was privileged to participate in during the last Microsoft Management Summit (MMS, April 2013).
The original is hosted by Microsoft at http://channel9.msdn.com/Events/MMS/2013/IM-B309, and I've copied this edition here for sharing on my LinkedIn profile.
SIM204-What's Coming in Virtual Machine Manager 2012?Lai Yoong Seng
In this session, we (Raymond Chou (SCOM MVP) & Lai Yoong Seng (VM MVP) provided an overview of the new features in System Center Virtual Machine Manager 2012 which included new architecture of VMM 2012 and 4 pillar of management:- deployment, fabric, cloud and services management at Microsoft Tech-Ed New Zealand 2011 (Auckland).
More info at: www.poweronplatforms.com
follow us for more Microsoft System Center info:
https://www.linkedin.com/company/poweronplatforms
Leading the way with Microsoft System Center deployments and training
Looking at Deploying Microsoft System Center 2012 ... This is a must see session for you. Typically Microsoft System Center has been well documented as a complex system to implement into your organisation, with a single component taking 2-3 months and the suite normally 18 months to deploy. This means a high overhead and protracted deployment process before your business can start to realise the benefits of the system.
No longer is this the case.
In this session you will get to see new methods that have been proven in Enterprise scale deployments, reducing this deployment time down to days!! This means with covering design and training your business can be up and running in a matter of weeks.
The Session is delivered by Microsoft Most Valuable Professional (MVP) Steve Beaumont, who is PowerONPlatforms Technical / Product Director.
The session will cover:
System Center Overview
Traditional Deployment Styles
Automated Deployment Tools and Appliance Platforms
Real Life Customer Examples
Q&A
How to Deploy WSO2 Enterprise Integrator in ContainersWSO2
This slide deck explores how WSO2 Enterprise Integrator can be deployed on a containerized deployment and the key configuration steps of successful production deployment and monitoring.
Watch webinar here: https://wso2.com/library/webinars/2018/10/how-to-deploy-wso2-enterprise-integrator-in-containers/
Moderne Serverless-Computing-Plattformen sind in aller Munde und stellen ein Programmiermodell zur Verfügung, wo sich der Nutzer keine Gedanken mehr über die Administration der Server, Storage, Netzwerk, virtuelle Maschinen, Hochverfügbarkeit und Skalierbarkeit machen brauch, sondern sich auf das Schreiben von eigenen Code konzentriert. Der Code bildet die Geschäftsanforderungen modular in Form von kleinen Funktionspaketen (Functions) ab. Functions sind das Herzstück der Serverless-Computing-Plattform. Sie lesen von der (oft Standard-)Eingabe, tätigen ihre Berechnungen und erzeugen eine Ausgabe. Die zu speichernden Ergebnisse von Funktionen werden in einem permanenten Datastore abgelegt, wie z.B. der Autonomous Database gespeichert. Die Autonomous Database besitzt folgende drei Eigenschaften self-driving, self-repairing und self-securing, die für einen modernen Anwendungsentwicklungsansatz benötigt werden.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Automating Windows Server 2008 R2 Administration with Windows PowerShell
1. Automating Windows Server 2008 R2
Administration with Windows PowerShell
Aleksandar Nikolić, PowerShell MVP
Twitter: @alexandair
October 20, 2011
2. What is Windows PowerShell?
• Not just a command-line shell
• Not just a scripting language
• An automation engine, an automation platform
• Designed especially for system administration
• Cmdlets – built-in PowerShell commands
3. Why Windows PowerShell? (1)
• To automate administrative tasks
• Manage the computers from the command-line
• Access to file system, Registry, certificate store…
• The Admin Development Model
– An interactive shell -> quick and dirty scripting -> a formal production scripting
• Based on the .NET Framework
4. Why Windows PowerShell? (2)
• Consistency and discoverability
• Standards-based management (WMI/CIM and WSMan)
• Extensible (PowerShell modules/snap-ins)
• Great help system
• PowerShell vs. GUI PowerShell and GUI
5. How to get it?
• Windows PowerShell v2
• Windows 7 and Server 2008 R2
– A part of the operating system
– Server Core! (optional feature)
• XP SP3, Vista SP2, Server 2003 SP2, and 2008 SP2
– Windows Management Framework (KB968929)
– Windows Update and WSUS
6. Windows PowerShell in a Nutshell
• Cmdlets (Verb-Noun)
• PSProviders and PSDrives
• Get-Help, Get-Command, Get-Member, Get-PSDrive
• Pipeline
• Sends objects down the pipeline
• -WhatIf and –Confirm parameters
8. Automating Management Tasks
• Standards-based management (WMI/CIM and WSMan)
• Local and remote
• PowerShell jobs
• Task scheduling
9. Management Stack in PowerShell v2
Management DCOM DCOM WMI
DCOM Providers
Application Client Service Engine Providers
WMI
Server Default
PowerShell WinRM WinRM PowerShell
Manager WS-Management Endpoint PowerShell
Remoting Client Service
Console Custom
PowerShell
Endpoint
10. Standards-Based Management
ion
Communicat
Pathway
0)
rt 8
po
p(
htt
Internet
wsman.msft.net
Managed Source
Managed Source
Management Station
Management Station
• Protocol: DMTF Standard Protocol: Web Services Management (WSMan)
• Agent: The WinRM service in Windows implements the server role of the WSMan protocol. WMI
implements the CIMOM.
• Tool: WSMan cmdlets allow access to any device that complies with CIM and WSMan standards
• Extensions: Microsoft extensions to WSMan enable PowerShell remoting (1-1, 1-many, many-1)
12. Extending Windows PowerShell
• Think about MMC snap-ins
• A set of related PowerShell functionalities
• To package and deploy PowerShell functionalities
• PSSnapins (v1+)
– Get-PSSnapin –Registered
– Quest AD cmdlets and VMware vSphere PowerCLI cmdlets
• Modules (v2+)
– Get-Module –ListAvailable
– include cmdlets, providers, functions, variables, aliases
13. Built-in Modules
Name Command to import module or add snap-in
Active Directory Rights Management Services Import-Module ADRMS
module for Windows PowerShell
Application ID Policy Management module for Import-Module AppLocker
Windows PowerShell
Best Practice Analyzer module for Windows Import-Module BestPractices
PowerShell
Background Intelligent Transfer Service (BITS) Import-Module BITSTransfer
module for Windows PowerShell
Server Manager module for Windows PowerShell Import-Module ServerManager
Troubleshooting pack support Import-Module TroubleshootingPack
14. Name Required installed role or feature Command to import module or add snap-in
Active Directory module for Windows PowerShell Requires installation of the Active Directory Domain Import-Module ActiveDirectory
Services role
Active Directory Rights Management Services Requires installation of the AD RMS role. Import-Module ADRMSAdmin
administration module for Windows PowerShell
Failover Clusters module for Windows PowerShell Requires installation of the Failover Clustering Import-Module FailoverClusters
feature.
Group Policy module for Windows PowerShell Requires installation of the Group Policy Import-Module GroupPolicy
Management feature.
Network Load Balancing Clusters module for Requires installation of the Network Load Balancing Import-Module NetworkLoadBalancingClusters
Windows PowerShell feature.
Remote Desktop Services module for Windows Requires installation of the Remote Desktop Import-Module RemoteDesktopServices
PowerShell Services role.
Server Migration module for Windows PowerShell Requires installation of the Windows Server Add-PSSnapin
Migration Tools feature Microsoft.Windows.ServerManager.Migration
Windows Backup snap-in for Windows PowerShell Requires installation of the Windows Server Backup Add-PSSnapin Windows.ServerBackup
Features: Windows Server Backup and Command-
line Tools.
Internet Information Services (IIS) module for Requires installation of the Web Server (IIS) role Import-Module WebAdministration
Windows PowerShell
Web Services for Management (WS-Management) Requires installation of Web Services for Add-PSSnapin Microsoft.WSMan.Management
Management (WS-Management) role
16. Further Reading
Windows PowerShell in Action, Second Edition
Bruce Payette
http://www.manning.com/payette2/
Windows PowerShell Cookbook, Second Edition
Lee Holmes
http://oreilly.com/catalog/9780596801519
Administrator's Guide to Windows PowerShell Remoting
Dr. Tobias Weltner, Aleksandar Nikolic, Richard Giles
http://powershell.com/cs/media/p/4908.aspx
17. Requirements
• Windows PowerShell requires Microsoft .NET Framework 2.0 SP1
• PowerShell ISE requires Microsoft .NET Framework 3.5 SP1
• Out-GridView requires Microsoft .NET Framework 3.5 SP1
• Get-WinEvent requires Vista or newer and Microsoft .NET Framework 3.5
• Get-Counter and Import-Counter require Vista or newer
• Export-Counter requires Windows 7
18. Microsoft Resources
• Microsoft Windows PowerShell
– http://www.microsoft.com/powershell
• Windows PowerShell Team Blog
– http://blogs.msdn.com/PowerShell
• MS TechNet Script Center
– http://www.microsoft.com/technet/scriptcenter/hubs/msh.mspx
• PowerShell Forum
– http://social.technet.microsoft.com/Forums/en-US/winserverpowershell/
• Windows PowerShell Survival Guide
– http://social.technet.microsoft.com/wiki/contents/articles/windows-
powershell-survival-guide.aspx
19. Community Resources
• PowerShell Community
– http://powershellcommunity.org
• PowerShell Code Repository
– http://poshcode.org
• PowerShell.com Community
– http://powershell.com
• PowerGUI.org Community
– http://powergui.org
• PowerShell Magazine
– http://powershellmagazine.com
• irc.freenode.net #PowerShell
21. Openness and Interoperability @Microsoft
Microsoft and Port25 Codeplex
Open Source blogs from the platform resources for
gateway for deeper community and the developers and
exploration of open OSS Lab teams consumers of open
source engagements http://Port25.technet.com source projects
http://www.microsoft.com/ http://www.codeplex.com
openness
Interoperability Open Up Shared Source
Bridges cross-Industry portal for
technical collaborative Interoperability and programmatically
works Standards activities sharing code
http://www.interoperability http://www.microsoft.com/ http://www.microsoft.com/
bridges.com interop/openup sharedsource
OData Open Spec BizSpark
open source starter kit protocols, file formats, Program for Start-Up
for Internet publishing of standards, technical companies from both
Government datasets specifications commercial and open
using the Open Data http://www.microsoft.com/ source backgrounds
http://ogdisdk.cloudapp.net openspecifications http://www.microsoft.com/
bizspark
How can I receive up-to-date Openness announcements from Microsoft?
In addition to the websites above, you can receive regular updates to Microsoft’s
openness, interoperability and standards efforts via the following channels:
• http://blogs.technet.com/b/openness/
• http://blogs.msdn.com/b/interoperability/
• http://twitter.com/OpenAtMicrosoft
• http://port25.technet.com
• http://channel9.msdn.com/Blogs/Interoperability
22. Please rate this lecture
and WIN HTC MOZART!
Help us choose the best Sinergija
lecturer! Telekom Srbija and
Microsoft will award you – at the
conference end, we’ll give one HTC
Mozart WP7 phone to someone
from the audience – randomly.
Go to www.mssinergija.net, log in
and cast your votes.
You can rate only lectures that you were present at, just once. More lectures you rate, more chances you have.
Please use computers at the front of this room, or rate lecture from your phone or home computer, at Sinergija portal.
This prize contest will end at Thursday, October 20th at 9 PM. Winner will be announced at the official Sinergija web portal,
www.mssinergija.net
is a friend of Sinergija 2011
Conference and Imagine Cup
student competition in Serbia.