Load Windows 7 or Windows Server 2008 R2 on a system, and you'll notice something sort of strange: there's no boot record or BCD folder. Look at other Windows 7/R2 systems, and you may notice something even stranger: there's only one file on the hard disk, and yet you can boot the system and run a normal Windows system. What's going on here? Simple: Windows 7 gets a lot of press for its faster-than-Vista performance and newer user interface, but there's a lot more to it also, including native support of VHD files (that's how a one-file system boots) as well as a new default disk structure, support of direct-to-disk ISO burning, and more. Whether you're going to Windows 7 sometime soon or five years from now, you'll want to be prepared for the changes that Windows 7 brings to storage -- and who better to prepare you than veteran Windows explainer Mark Minasi? Join Mark for this quick look at Windows 7/R2 storage and save yourself having to read a small mountain of whitepapers!
Este documento describe los conceptos básicos de la capa física del modelo OSI. Explica que la capa física proporciona los medios para transportar bits a través de redes de datos mediante el uso de señales eléctricas, ópticas o de radiofrecuencia. También describe los principios fundamentales de codificación, señalización y agrupación de bits, así como los diferentes tipos de medios físicos como cobre, fibra óptica e inalámbricos.
El documento describe las contribuciones de los pioneros de la victimología, incluyendo a Von Henting, quien propuso una visión dinámica e interaccionista de la víctima del delito en su obra de 1948. Mendelsohn fue el primero en utilizar el término "victimología" y desarrolló una tipología de víctimas. El documento también presenta conceptos básicos de la victimología como victimario, victimidad, dinámica victimal y círculo victimal.
Om monumenten in Nederland in stand te houden worden er jaarlijks veel objecten gerestaureerd en onderhouden. Dit rapport geeft een beeld van de verwachte ontwikkeling en samenstelling van de restauratieproductie voor de periode 2013-2018. Hoeveel monumenten zijn er in Nederland, en welk deel daarvan staat op de Rijksmonumentenlijst? Welke subsidieregelingen zijn er en hoeveel budget is in de komende jaren beschikbaar? En wat betekent dit voor de restauratieproductie? Antwoorden op deze vragen komen in dit rapport aan bod.
Bron: EIB
------- INHOUD -------
1 Inleiding 13
1.1 Algemeen 13
1.2 Instandhouding 13
1.3 Herbestemming 14
1.4 Ontwikkeling van de restauratiebehoefte 14
1.5 Leeswijzer 15
2 Monumentenbestand 17 2.1 Rijksmonumenten 17
2.2 Lokale monumenten 21
3 Restauratiefinanciering 23 3.1 Subsidieregelingen 24
3.2 Indirecte subsidiëring 29
3.3 Ongesubsidieerde restauraties 31
3.4 Lokale subsidiëring en herbestemming 32
4 Restauratiemarkt 33
4.1 Direct gesubsidieerde productie 33
4.2 Indirect gesubsidieerde productie 34
4.3 Ongesubsidieerde productie 36
4.4 Landelijk overzicht 37
4.5 Regionale restauratiemarkten 38
4.6 Restauratie en bouwmarkt 40
4.7 Restauratie versus onderhoud 41
Bijlage A Onroerend-erfgoedcijfers 43
Bijlage B Achtergrond ramingen 45
Afkortingen 47
Bronnen 49
EIB-publicaties 51
El documento trata sobre los fitoquímicos y sus efectos en la salud humana. Explica que los fitoquímicos son compuestos químicos presentes en las plantas que cumplen roles importantes en el organismo. También describe diferentes formas de consumir plantas medicinales, así como algunos problemas de salud que pueden producir los químicos de ciertas plantas cuando se consumen en exceso o de manera inadecuada. Finalmente, resume las características y formas de uso de las plantas medicinales.
Este documento presenta el Reglamento Interno de Trabajo de la empresa SALUD OCUPACIONAL NORTE S.A.C. Establece 20 capítulos que regulan aspectos como la incorporación de colaboradores, derechos y obligaciones laborales, uniformes, jornada laboral, permisos, evaluación de desempeño, orden y disciplina, seguridad e higiene, vacaciones, atenciones médicas, y disposiciones finales. El objetivo es establecer normas que permitan condiciones de trabajo justas y equitativas para los
Fundamentos de red: 8. La capa física del modelo osiFrancesc Perez
El documento describe la capa física del modelo OSI. Explica que la capa física controla cómo se transmiten los datos a través del medio físico mediante la codificación de bits en señales eléctricas, ópticas o de radiofrecuencia. También describe los diferentes tipos de medios físicos como cobre, fibra óptica e inalámbricos, así como los estándares y tecnologías asociados a cada uno.
El documento introduce los conceptos de liderazgo y líder. Define el liderazgo como la capacidad de orientar a un grupo hacia objetivos compartidos utilizando las habilidades, conocimientos y capacidades de sus miembros. Un líder es aquel individuo que conduce y orienta al grupo hacia el logro de objetivos otorgando continuidad y coherencia a sus esfuerzos. Además, señala que el liderazgo es el resultado del aprendizaje y no de la naturaleza, por lo que los líderes se forman a través del compromiso y
El documento presenta un formato de encuesta para evaluar la calidad de la gestión de escuelas indígenas. La encuesta contiene 26 preguntas sobre el director de la escuela y sus responsabilidades de liderazgo, y 5 preguntas sobre los profesores y su enseñanza. Se pide a los estudiantes y padres de familia que respondan las preguntas seleccionando una opción en una escala de 1 a 5. El objetivo es obtener opiniones de la comunidad escolar para mejorar el funcionamiento y desempeño de la escuela.
Este documento describe los conceptos básicos de la capa física del modelo OSI. Explica que la capa física proporciona los medios para transportar bits a través de redes de datos mediante el uso de señales eléctricas, ópticas o de radiofrecuencia. También describe los principios fundamentales de codificación, señalización y agrupación de bits, así como los diferentes tipos de medios físicos como cobre, fibra óptica e inalámbricos.
El documento describe las contribuciones de los pioneros de la victimología, incluyendo a Von Henting, quien propuso una visión dinámica e interaccionista de la víctima del delito en su obra de 1948. Mendelsohn fue el primero en utilizar el término "victimología" y desarrolló una tipología de víctimas. El documento también presenta conceptos básicos de la victimología como victimario, victimidad, dinámica victimal y círculo victimal.
Om monumenten in Nederland in stand te houden worden er jaarlijks veel objecten gerestaureerd en onderhouden. Dit rapport geeft een beeld van de verwachte ontwikkeling en samenstelling van de restauratieproductie voor de periode 2013-2018. Hoeveel monumenten zijn er in Nederland, en welk deel daarvan staat op de Rijksmonumentenlijst? Welke subsidieregelingen zijn er en hoeveel budget is in de komende jaren beschikbaar? En wat betekent dit voor de restauratieproductie? Antwoorden op deze vragen komen in dit rapport aan bod.
Bron: EIB
------- INHOUD -------
1 Inleiding 13
1.1 Algemeen 13
1.2 Instandhouding 13
1.3 Herbestemming 14
1.4 Ontwikkeling van de restauratiebehoefte 14
1.5 Leeswijzer 15
2 Monumentenbestand 17 2.1 Rijksmonumenten 17
2.2 Lokale monumenten 21
3 Restauratiefinanciering 23 3.1 Subsidieregelingen 24
3.2 Indirecte subsidiëring 29
3.3 Ongesubsidieerde restauraties 31
3.4 Lokale subsidiëring en herbestemming 32
4 Restauratiemarkt 33
4.1 Direct gesubsidieerde productie 33
4.2 Indirect gesubsidieerde productie 34
4.3 Ongesubsidieerde productie 36
4.4 Landelijk overzicht 37
4.5 Regionale restauratiemarkten 38
4.6 Restauratie en bouwmarkt 40
4.7 Restauratie versus onderhoud 41
Bijlage A Onroerend-erfgoedcijfers 43
Bijlage B Achtergrond ramingen 45
Afkortingen 47
Bronnen 49
EIB-publicaties 51
El documento trata sobre los fitoquímicos y sus efectos en la salud humana. Explica que los fitoquímicos son compuestos químicos presentes en las plantas que cumplen roles importantes en el organismo. También describe diferentes formas de consumir plantas medicinales, así como algunos problemas de salud que pueden producir los químicos de ciertas plantas cuando se consumen en exceso o de manera inadecuada. Finalmente, resume las características y formas de uso de las plantas medicinales.
Este documento presenta el Reglamento Interno de Trabajo de la empresa SALUD OCUPACIONAL NORTE S.A.C. Establece 20 capítulos que regulan aspectos como la incorporación de colaboradores, derechos y obligaciones laborales, uniformes, jornada laboral, permisos, evaluación de desempeño, orden y disciplina, seguridad e higiene, vacaciones, atenciones médicas, y disposiciones finales. El objetivo es establecer normas que permitan condiciones de trabajo justas y equitativas para los
Fundamentos de red: 8. La capa física del modelo osiFrancesc Perez
El documento describe la capa física del modelo OSI. Explica que la capa física controla cómo se transmiten los datos a través del medio físico mediante la codificación de bits en señales eléctricas, ópticas o de radiofrecuencia. También describe los diferentes tipos de medios físicos como cobre, fibra óptica e inalámbricos, así como los estándares y tecnologías asociados a cada uno.
El documento introduce los conceptos de liderazgo y líder. Define el liderazgo como la capacidad de orientar a un grupo hacia objetivos compartidos utilizando las habilidades, conocimientos y capacidades de sus miembros. Un líder es aquel individuo que conduce y orienta al grupo hacia el logro de objetivos otorgando continuidad y coherencia a sus esfuerzos. Además, señala que el liderazgo es el resultado del aprendizaje y no de la naturaleza, por lo que los líderes se forman a través del compromiso y
El documento presenta un formato de encuesta para evaluar la calidad de la gestión de escuelas indígenas. La encuesta contiene 26 preguntas sobre el director de la escuela y sus responsabilidades de liderazgo, y 5 preguntas sobre los profesores y su enseñanza. Se pide a los estudiantes y padres de familia que respondan las preguntas seleccionando una opción en una escala de 1 a 5. El objetivo es obtener opiniones de la comunidad escolar para mejorar el funcionamiento y desempeño de la escuela.
El documento describe los diferentes factores y enfoques que deben considerarse al determinar los precios de productos y servicios. Entre los factores internos se encuentran los objetivos de mercadeo y costos de la empresa, mientras que los factores externos incluyen la demanda del mercado y la competencia. Los enfoques para fijar precios pueden basarse en los costos, el valor percibido por los clientes, los precios de la competencia, o la demanda del mercado. Al determinar precios para servicios se deben considerar aspectos como los costos monetarios y
This document discusses emotions, moods, and stress in the workplace. It begins by explaining why emotions were previously ignored in organizational behavior research due to beliefs that emotions were irrational. It then defines basic emotions and moods, and discusses the functions of emotions. Several sources of emotions and moods are outlined. Burnout, emotional labor, and affective events theory are explained. The concepts of emotional intelligence, stress, coping with stress, and managing stress are also covered. The document concludes by emphasizing that emotions and moods impact many aspects of organizational behavior and should not be ignored by managers.
El documento habla sobre el concepto y clasificación de los alimentos. Define alimentos como todo lo necesario para la subsistencia y bienestar de una persona. Explica que los alimentos son un derecho fundamental y que hay obligaciones alimenticias legales entre cónyuges, descendientes, ascendientes y otros parientes. Además, describe los requisitos y partes de la obligación alimenticia como la necesidad del alimentario y las facultades del alimentante.
Este documento presenta los conceptos y metodología de la Teoría General de Sistemas (TGS) y su aplicación a la investigación científica. La TGS define un sistema como un conjunto de elementos interrelacionados y busca desarrollar una terminología y leyes aplicables a todos los sistemas. Se explican conceptos clave como realimentación, sinergia y recursividad. Además, se describe la metodología de aplicación de la TGS a la administración que incluye etapas como definición de objetivos, relevamiento de información
La contabilidad de costos es una disciplina contable que provee información sobre los costos a la gerencia para la toma de decisiones. Determina el costo de los productos, clasifica los costos como variables, fijos o mixtos, y los asigna a departamentos, actividades y períodos para medir el rendimiento y calcular la utilidad. Su objetivo principal es medir los resultados de manera significativa.
Este documento presenta 53 ejercicios de cálculo de derivadas de funciones. Los ejercicios involucran funciones algebraicas, trigonométricas, exponenciales y logarítmicas. Se pide calcular la derivada de cada función y representar gráficamente algunas de las funciones y sus derivadas.
Este documento explica cómo crear subredes a partir de una dirección IP y máscara de red. Detalla que al tomar bits del campo de host de la dirección se pueden generar subredes, y que cada subred toma un valor diferente en ese octeto. Luego proporciona ejemplos de 8 subredes creadas a partir de la red 192.168.0.0/24. Por último, indica que según la norma Cisco no se deben usar la primera y última subred posible.
¿Qué hace recursos humanos en la empresa?esmemartinezj
El departamento de recursos humanos se encarga de la planificación, selección, contratación y formación del personal de una empresa. También gestiona las nóminas, prestaciones y beneficios de los empleados, así como su evaluación continua y el proceso disciplinario. Recursos humanos es un área central en las organizaciones modernas debido a su importante papel en el correcto funcionamiento administrativo del personal de una empresa.
Dissertação (2011) Governança Pública, Consórcios Intermunicipais e Gerenciam...fcmatosbh
Here are the key points from the document summarized in 3 sentences or less:
[SUMMARY]
This dissertation aims to evaluate the contribution of intermunicipal consortiums in developing environmental management for the sustainable and responsible management of water resources. It also analyzes the governance process in intermunicipal consortiums, conducting a case study of the Intermunicipal Consortium of the Paraopeba River Basin (CIBAPAR). Additionally, it assesses the relationship between municipalities and the intermunicipal consortium and the level of participation or reasons for non-participation in the consortium.
Este documento presenta los portafolios electrónicos de 6 estudiantes de Ingeniería en Sistemas de la Universidad del Tolima. Cada portafolio incluye información personal sobre cada estudiante como su nombre, edad, objetivos de vida y filosofía. Los estudiantes comparten información sobre sus intereses, metas educativas y profesionales, y lo que esperan lograr para sí mismos, sus familias y la sociedad.
School! is hét onderwijsmagazine voor het openbaar onderwijs en een gezamenlijke uitgave van de Vereniging Openbaar Onderwijs en VOS/ABB, School! verschijnt zeven keer per jaar, het eerste nummer verschijnt op 9 september 2010. Leden ontvangen het blad gratis. Het magazine besteedt veel aandacht aan ontwikkelingen in het (openbaar) onderwijs, medezeggenschap, tussenschoolse en buitenschoolse opvang en de identiteit van het openbaar onderwijs.
Este documento presenta una tabla de la escala de tiempo geológico que detalla los principales eones, eras, periodos y épocas desde el Fanerozoico hasta el Precámbrico, junto con breves descripciones de algunos eventos y formas de vida asociados a cada periodo.
Este documento presenta una introducción al tema de las políticas públicas. Explica que las políticas públicas son cursos de acción del gobierno para abordar problemas sociales de manera interdisciplinaria. También distingue entre política como lucha por el poder y políticas como actividades gubernamentales concretas. Finalmente, define las políticas públicas como acciones coordinadas del Estado y la sociedad para lograr objetivos de interés público de manera democrática.
Hildegard Peplau was the first nursing theorist published in over a century. She created the nursing theory of Interpersonal Relations, which focused on the nurse-patient relationship and revolutionized nursing as a scholarly discipline. Peplau drew from her experiences as a nurse and student of psychology to develop a theory based on empirical evidence from analyzing nurse-patient interactions. Her theory established concepts of nursing roles, phases of the relationship, and techniques like process recording that are still used in nursing education today.
Metodologia agil para el diseño de aplicaciones multimedias movilescristopherf
Esta es una guia documental basada en la metodologia MADAMDM (Meotologia Agil para el Diseño de Aplicaciones Multimedias de Dispositivos Moviles), la cual puede servir de ayuda a los desarrolladores de aplicaciones bajo cualquier tipo de sistema operativo movil.
El conjunto de los números reales y ejercicios de aplicacionJorge Villa
Este documento presenta una introducción a los diferentes tipos de números, incluyendo números naturales, enteros, racionales, irracionales, imaginarios y complejos. Define cada conjunto de números, sus propiedades y operaciones básicas. También incluye ejemplos para ilustrar la aplicación práctica de cada tipo de número.
Contabilidad y Administración de CostosMoishef HerCo
El documento describe tres aspectos clave de los sistemas de costos: 1) los objetivos de un sistema de costos, que incluyen asignar costos a unidades producidas, valuar inventarios, proveer información para control de costos y reducir costos; 2) las clasificaciones de sistemas de costos según características de producción, momento en que se determinan costos, y tratamiento de costos fijos; 3) los elementos y control del costo de materia prima, incluyendo compras, almacenamiento, valuación y suministro.
Un accidente de trabajo o enfermedad laboral ocurre repentinamente durante el trabajo o por órdenes del empleador y causa lesiones, daños funcionales u orgánicos, invalidez o muerte. Un accidente de trabajo es cualquier suceso repentino que ocurre por causas o durante el trabajo y produce un daño en el trabajador, mientras que una enfermedad laboral es aquella causada por la exposición a riesgos inherentes al trabajo. Es importante adoptar medidas de seguridad para prevenir accidentes y reportar oportunamente cualquier accidente o enfermed
Citrix vision and product highlights november 2011Louis Göhl
Scripted customer facing high level presentation that outlines the Citrix vision and strategy set in the personal, private and public cloud framework. Includes latest messaging from Synergy Barcelona.
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.Louis Göhl
Take a sprinkling of Windows 7, add Windows Server 2008 R2, IPv6 and IPsec and you have a solution that will allow direct access to your corporate network without the need for VPNs. Come to these demo-rich sessions and learn how to integrate DirectAccess into your environment. In Part 1 learn about IPv6 addressing, host configuration and transitioning technologies including 6to4, ISATAP, Teredo and IPHTTPS. Through a series of demos learn how to build an IPv6 Network and interoperate with IPv4 networks and hosts. In Part 2 we add the details of IPSec, and components that are only available with Windows 7 and Windows Server 2008 R2 to build the DirectAccess infrastructure. Learn how to control access to corporate resources and manage Internet connected PCs through group policy. Part 1 is highly recommended as a prerequisite for Part 2.
El documento describe los diferentes factores y enfoques que deben considerarse al determinar los precios de productos y servicios. Entre los factores internos se encuentran los objetivos de mercadeo y costos de la empresa, mientras que los factores externos incluyen la demanda del mercado y la competencia. Los enfoques para fijar precios pueden basarse en los costos, el valor percibido por los clientes, los precios de la competencia, o la demanda del mercado. Al determinar precios para servicios se deben considerar aspectos como los costos monetarios y
This document discusses emotions, moods, and stress in the workplace. It begins by explaining why emotions were previously ignored in organizational behavior research due to beliefs that emotions were irrational. It then defines basic emotions and moods, and discusses the functions of emotions. Several sources of emotions and moods are outlined. Burnout, emotional labor, and affective events theory are explained. The concepts of emotional intelligence, stress, coping with stress, and managing stress are also covered. The document concludes by emphasizing that emotions and moods impact many aspects of organizational behavior and should not be ignored by managers.
El documento habla sobre el concepto y clasificación de los alimentos. Define alimentos como todo lo necesario para la subsistencia y bienestar de una persona. Explica que los alimentos son un derecho fundamental y que hay obligaciones alimenticias legales entre cónyuges, descendientes, ascendientes y otros parientes. Además, describe los requisitos y partes de la obligación alimenticia como la necesidad del alimentario y las facultades del alimentante.
Este documento presenta los conceptos y metodología de la Teoría General de Sistemas (TGS) y su aplicación a la investigación científica. La TGS define un sistema como un conjunto de elementos interrelacionados y busca desarrollar una terminología y leyes aplicables a todos los sistemas. Se explican conceptos clave como realimentación, sinergia y recursividad. Además, se describe la metodología de aplicación de la TGS a la administración que incluye etapas como definición de objetivos, relevamiento de información
La contabilidad de costos es una disciplina contable que provee información sobre los costos a la gerencia para la toma de decisiones. Determina el costo de los productos, clasifica los costos como variables, fijos o mixtos, y los asigna a departamentos, actividades y períodos para medir el rendimiento y calcular la utilidad. Su objetivo principal es medir los resultados de manera significativa.
Este documento presenta 53 ejercicios de cálculo de derivadas de funciones. Los ejercicios involucran funciones algebraicas, trigonométricas, exponenciales y logarítmicas. Se pide calcular la derivada de cada función y representar gráficamente algunas de las funciones y sus derivadas.
Este documento explica cómo crear subredes a partir de una dirección IP y máscara de red. Detalla que al tomar bits del campo de host de la dirección se pueden generar subredes, y que cada subred toma un valor diferente en ese octeto. Luego proporciona ejemplos de 8 subredes creadas a partir de la red 192.168.0.0/24. Por último, indica que según la norma Cisco no se deben usar la primera y última subred posible.
¿Qué hace recursos humanos en la empresa?esmemartinezj
El departamento de recursos humanos se encarga de la planificación, selección, contratación y formación del personal de una empresa. También gestiona las nóminas, prestaciones y beneficios de los empleados, así como su evaluación continua y el proceso disciplinario. Recursos humanos es un área central en las organizaciones modernas debido a su importante papel en el correcto funcionamiento administrativo del personal de una empresa.
Dissertação (2011) Governança Pública, Consórcios Intermunicipais e Gerenciam...fcmatosbh
Here are the key points from the document summarized in 3 sentences or less:
[SUMMARY]
This dissertation aims to evaluate the contribution of intermunicipal consortiums in developing environmental management for the sustainable and responsible management of water resources. It also analyzes the governance process in intermunicipal consortiums, conducting a case study of the Intermunicipal Consortium of the Paraopeba River Basin (CIBAPAR). Additionally, it assesses the relationship between municipalities and the intermunicipal consortium and the level of participation or reasons for non-participation in the consortium.
Este documento presenta los portafolios electrónicos de 6 estudiantes de Ingeniería en Sistemas de la Universidad del Tolima. Cada portafolio incluye información personal sobre cada estudiante como su nombre, edad, objetivos de vida y filosofía. Los estudiantes comparten información sobre sus intereses, metas educativas y profesionales, y lo que esperan lograr para sí mismos, sus familias y la sociedad.
School! is hét onderwijsmagazine voor het openbaar onderwijs en een gezamenlijke uitgave van de Vereniging Openbaar Onderwijs en VOS/ABB, School! verschijnt zeven keer per jaar, het eerste nummer verschijnt op 9 september 2010. Leden ontvangen het blad gratis. Het magazine besteedt veel aandacht aan ontwikkelingen in het (openbaar) onderwijs, medezeggenschap, tussenschoolse en buitenschoolse opvang en de identiteit van het openbaar onderwijs.
Este documento presenta una tabla de la escala de tiempo geológico que detalla los principales eones, eras, periodos y épocas desde el Fanerozoico hasta el Precámbrico, junto con breves descripciones de algunos eventos y formas de vida asociados a cada periodo.
Este documento presenta una introducción al tema de las políticas públicas. Explica que las políticas públicas son cursos de acción del gobierno para abordar problemas sociales de manera interdisciplinaria. También distingue entre política como lucha por el poder y políticas como actividades gubernamentales concretas. Finalmente, define las políticas públicas como acciones coordinadas del Estado y la sociedad para lograr objetivos de interés público de manera democrática.
Hildegard Peplau was the first nursing theorist published in over a century. She created the nursing theory of Interpersonal Relations, which focused on the nurse-patient relationship and revolutionized nursing as a scholarly discipline. Peplau drew from her experiences as a nurse and student of psychology to develop a theory based on empirical evidence from analyzing nurse-patient interactions. Her theory established concepts of nursing roles, phases of the relationship, and techniques like process recording that are still used in nursing education today.
Metodologia agil para el diseño de aplicaciones multimedias movilescristopherf
Esta es una guia documental basada en la metodologia MADAMDM (Meotologia Agil para el Diseño de Aplicaciones Multimedias de Dispositivos Moviles), la cual puede servir de ayuda a los desarrolladores de aplicaciones bajo cualquier tipo de sistema operativo movil.
El conjunto de los números reales y ejercicios de aplicacionJorge Villa
Este documento presenta una introducción a los diferentes tipos de números, incluyendo números naturales, enteros, racionales, irracionales, imaginarios y complejos. Define cada conjunto de números, sus propiedades y operaciones básicas. También incluye ejemplos para ilustrar la aplicación práctica de cada tipo de número.
Contabilidad y Administración de CostosMoishef HerCo
El documento describe tres aspectos clave de los sistemas de costos: 1) los objetivos de un sistema de costos, que incluyen asignar costos a unidades producidas, valuar inventarios, proveer información para control de costos y reducir costos; 2) las clasificaciones de sistemas de costos según características de producción, momento en que se determinan costos, y tratamiento de costos fijos; 3) los elementos y control del costo de materia prima, incluyendo compras, almacenamiento, valuación y suministro.
Un accidente de trabajo o enfermedad laboral ocurre repentinamente durante el trabajo o por órdenes del empleador y causa lesiones, daños funcionales u orgánicos, invalidez o muerte. Un accidente de trabajo es cualquier suceso repentino que ocurre por causas o durante el trabajo y produce un daño en el trabajador, mientras que una enfermedad laboral es aquella causada por la exposición a riesgos inherentes al trabajo. Es importante adoptar medidas de seguridad para prevenir accidentes y reportar oportunamente cualquier accidente o enfermed
Citrix vision and product highlights november 2011Louis Göhl
Scripted customer facing high level presentation that outlines the Citrix vision and strategy set in the personal, private and public cloud framework. Includes latest messaging from Synergy Barcelona.
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.Louis Göhl
Take a sprinkling of Windows 7, add Windows Server 2008 R2, IPv6 and IPsec and you have a solution that will allow direct access to your corporate network without the need for VPNs. Come to these demo-rich sessions and learn how to integrate DirectAccess into your environment. In Part 1 learn about IPv6 addressing, host configuration and transitioning technologies including 6to4, ISATAP, Teredo and IPHTTPS. Through a series of demos learn how to build an IPv6 Network and interoperate with IPv4 networks and hosts. In Part 2 we add the details of IPSec, and components that are only available with Windows 7 and Windows Server 2008 R2 to build the DirectAccess infrastructure. Learn how to control access to corporate resources and manage Internet connected PCs through group policy. Part 1 is highly recommended as a prerequisite for Part 2.
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...Louis Göhl
Take a sprinkling of Windows 7, add Windows Server 2008 R2, IPv6 and IPsec and you have a solution that will allow direct access to your corporate network without the need for VPNs. Come to these demo-rich sessions and learn how to integrate DirectAccess into your environment. In Part 1 learn about IPv6 addressing, host configuration and transitioning technologies including 6to4, ISATAP, Teredo and IPHTTPS. Through a series of demos learn how to build an IPv6 Network and interoperate with IPv4 networks and hosts. In Part 2 we add the details of IPSec, and components that are only available with Windows 7 and Windows Server 2008 R2 to build the DirectAccess infrastructure. Learn how to control access to corporate resources and manage Internet connected PCs through group policy. Part 1 is highly recommended as a prerequisite for Part 2.
This is a level 200 - 300 presentation.
It assumes:
Good understanding of vCenter 4, ESX 4, ESXi 4.
Preferably hands-on
We will only cover the delta between 4.1 and 4.0
Overview understanding of related products like VUM, Data Recovery, SRM, View, Nexus, Chargeback, CapacityIQ, vShieldZones, etc
Good understanding of related storage, server, network technology
Target audience
VMware Specialist: SE + Delivery from partners
This is a level 200 - 300 presentation.
It assumes:
Good understanding of vCenter 4, ESX 4, ESXi 4.
Preferably hands-on
We will only cover the delta between 4.1 and 4.0
Overview understanding of related products like VUM, Data Recovery, SRM, View, Nexus, Chargeback, CapacityIQ, vShieldZones, etc
Good understanding of related storage, server, network technology
Target audience
VMware Specialist: SE + Delivery from partners
Storage and hyper v - the choices you can make and the things you need to kno...Louis Göhl
This document summarizes storage options and best practices for Hyper-V virtualization. It discusses the different types of storage that can be used with Hyper-V hosts and virtual machines, including direct attached storage, storage area networks, and virtual hard disks. It also provides guidance on topics like storage performance, antivirus exclusion lists, encryption, clustering, and multi-path I/O configuration to optimize storage. Best practices are presented for areas like sizing storage, networking configurations, and high availability solutions.
Security best practices for hyper v and server virtualisation [svr307]Louis Göhl
The document provides information on the Microsoft Assessment & Planning Toolkit 5.0 customer technology preview and Visual Studio Team System 2010 Lab Management Beta 2. It also covers topics like Windows Server 2008 R2 Hyper-V security best practices, Hyper-V networking configurations, Windows Server 2008 R2: SCONFIG, and Hyper-V best practices.
Hyper v and live migration on cisco unified computing system - virtualized on...Louis Göhl
Learn how Cisco's new unified computing architecture, purpose built for virtualization, with Microsoft's Windows Server 2008 R2 Hyper-V and Live Migration, allow administrations to quickly allocate additional compute and storage resources for on-demand provisioning of new applications and users.
The document provides an overview of the HP BladeSystem portfolio including server blades, enclosures, and management software. Key points include:
- The BladeSystem uses modular components like server, storage, and networking blades that can be installed in enclosures to simplify infrastructure management.
- The c-Class enclosures, including the c7000 and c3000, provide optimized chassis for hosting blade servers with benefits like energy efficiency and integrated management tools.
- The server blades range from the low-cost BL2x220c to the high-performance BL860c, allowing customers to choose the right configuration for their needs. Management software like Insight Control provides tools to automate and optimize the BladeSystem environment.
UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...Louis Göhl
Selecting the right server hardware for an Exchange 2010 deployment becomes much easier when you know the product team's scalability and performance guidelines. This session provides a look at the product team's guidance for the processor and memory requirements of each server role in Exchange 2010. A number of key performance enhancements from this release are discussed, and you also learn about how to use related tools like the Exchange Storage Calculator, Exchange Profile Analyzer, Loadgen, and Jetstress to take the guesswork out of server sizing.
SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...Louis Göhl
Come and learn about all the new enhancements that are going to be delivered in Failover Clustering with Windows Server 2008 R2. This session looks at improvements since Windows Server 2008 including an overview of Cluster Shared Volumes (CSV), live migration, enhanced validation, PowerShell support, new HA workloads, improvements to existing workloads, supportability enhancements, and other exciting features designed to help you achieve even HIGHER availability for your Failover Cluster.
SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...Louis Göhl
This session focuses on the new capabilities of Windows Server 2008 R2 Hyper-V. The session also covers the base architecture of Hyper-V and provides guidance on key areas like storage management, performance, and more.
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?Louis Göhl
Windows Server 2008 R2 is here, with new tools and utilities for the directory service IT pro to help you manage and maximise the potential of your Active Directory. What's going to be your favourite new feature? Maybe it's the Best Practice Analyser that will scan your infrastructure and point out both compliant and noncompliant aspects of your environment together with suggestions for improvements. Do you want tools to simplify your day-to-day management of the AD? There's a new kid on the block, the Active Directory Administrative Center. Built on Windows PowerShell technology it provides a rich GUI allowing you to perform common Active Directory tasks through both data-driven and task-driven navigation. Not a GUI fan? Then R2 brings you more than 85 PowerShell Cmdlets to allow you to manage, diagnose, and automate AD tasks from the command-line or PowerShell scripts. Maybe your favourite will be the recycle bin allowing you to recover deleted objects while the directory is online or the ability to perform offline domain join allowing you to streamline your deployments. There are more choices, come to this high-energy, fast paced, demo rich presentation and get all the details
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...Louis Göhl
Come learn how Forefront and Exchange Server 2010 work better together! This session covers how Forefront Protection 2010 for Exchange Server (FPE) and Forefront Online Protection for Exchange (FOPE) will facilitate protection of Microsoft Exchange Server 2010 from malware and unsolicited mail.
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...Louis Göhl
System Center Service Manager, through the power of its integrated platform, reduces costs, improves service levels, delivers informed decision making and reduces the burden of compliance. In this session learn how Service Manager, now in Beta Two, lowers the cost of incident and problem resolution and provides a streamlined approach to change management by providing integrated knowledge of configuration items and the ability to easily assess the current health state of IT services by seamlessly integrating the activities between Service Manager, System Center Operations Manager and System Center Configuration manager. Also see how Service Manager will deliver a compliance and risk process management pack that harmonises over 350 regulatory standards into a comprehensive set of control objectives that can be managed and tracked.
MGT300 Using Microsoft System Center to Manage beyond the Trusted DomainLouis Göhl
Numerous Microsoft technologies are now taking advantage of digital certificate-based authentication to enable the support for and management of systems outside trusted networks and domains. Join us to learn how you can use digital certificates with System Center to extend your management capabilities beyond your immediate environment, and enable a single management infrastructure to manage systems and IT services across multiple trusted and untrusted domains.
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...Louis Göhl
Learn about the Microsoft virtualisation strategy from the datacenter, to the desktop, to the cloud--and how it will help you cut costs and build value. In this session we review and demonstrate Microsoft virtualisation products and discuss how you can use them to solve today's IT issues (cost cutting, consolidation, business continuity, green IT), develop new computing solutions (VDI) and build a foundation for a more dynamic IT environment, including cloud computing. The session reviews all of the latest Microsoft virtualisation products, including Application Virtualization (App-V), Microsoft Enterprise Desktop Virtualization (MED-V), Windows Server 2008 with Hyper-V, and Microsoft Hyper-V Server, as well as the System Center management platform (including Virtual Machine Manager 2008). Learn about the innovative pricing and licensing structure that allows further savings to lower both acquisition and ongoing ownership costs. Learn how you can enable IT to become a cost cutting mechanism with Microsoft virtualisation and management technologies.
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...Louis Göhl
You're excited about the new features in App-V 4.5, but where do you get started? This talk is meant to guide IT administrators through the App-V deployment decision process. Specifically, we discuss the various deployment types, pros and cons for each type of deployment, and performance and scalability issues. By the end of the presentation, IT administrators will be able to identify the deployment that is best suited for their preferences and infrastructure.
Windows Virtual Enterprise Centralized DesktopLouis Göhl
Virtualization brings about new use cases that did not previously exist in traditional desktop environments. These use cases include the ability to create multiple desktops dynamically, enable user access to multiple virtual machines (VMs) simultaneously, and move desktop VMs across multiple platforms, especially in load-balancing and disaster recovery situations. Microsoft designed Windows Virtual Enterprise Centralized Desktop (VECD) to enable organizations to license virtual copies of Windows client operating systems in virtual environments.
http://www.microsoft.com/windows/enterprise/solutions/virtualization/licensing.aspx
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Generative AI Deep Dive: Advancing from Proof of Concept to Production
CLI302 - How Windows Storage Is Changing: Everything's Going VHD!
1. What's New in Windows Storage Presented by Mark Minasi contents copyright 2009 Mark Minasi Do not redistribute Session Code: CLI302
2. Overview Volumes as Seven likes 'em: The Case of the Unlettered Drive VHDs Win 7 native support Storing OS volumes in VHDs Booting from a VHD What's new in Win 7 backup Short Items
4. Quick Review: BCD/BCDEDIT Let's back up and review something about how Vista boots and how W7 adapts that Vista doesn't use the NT boot loader that we've had since 3.1; instead, it uses a new "boot configuration database" (BCD), a hidden/system folder containing the boot loader and boot instructions It's why boot.ini's gone and bcdedit is essential Download the (free) first chapter of my Vista Security book for background and examples of bcdedit (Administering Windows Vista Security: The Big Surprises)
5. BCD in Win 7 If you install Win 7 on a system with a C: drive larger than about 24 GB in size, you'll end up with just one lettered ("C:") drive… but you will not be able to find the BCD folder on that drive, even with "dir c: /as" The reason: it's sitting on a separate partition that is not lettered For example:
6. This system is a simple laptop with a single 100 GB C: drive. I wiped the drives, told Win 7 to install to the one drive and did not tell it to chop the drive up… but here you see that it does that, creating an unlettered partition that contains the boot loader
7. Now Compare Explorer The Explorer view, in contrast, looks just like a Vista one-drive system – the unlettered volume doesn't appear at all
8. Why Did Microsoft Do This? Vista introduced the BitLocker drive encryption tool It's useful, but it required you to boot from a separate 1.5 GB partition that contained nothing more than the BOOT folder It was a pain to set up and didn't really need all that space, but MS put it in for compatibility This 100 MB volume now does the job
9. Why Do This? Additionally, having a "Drive S:" (or whatever letter the little active partition eventually got) looked strange Win 7's an improvement because Separate partition's automatic, no after-the-fact fumbling with partitions to use BitLocker Separate active partition supports booting from VHDs Win 7 active partition only uses 0.1 gig on your drive rather than 1.5 gigs
10. No Unlettered Volume?no problem! You probably don't have the unlettered volume, if you upgraded in place from Vista or Server 2008/3! Upgrades won't rearrange the existing disk structure to create the unlettered volume Upgrades won't "un-letter" an existing 1.5 GB system partition created for BitLocker under Vista
11. It Can Go at the Front or Back Must the 100 MB volume be the volume first physically placed on the hard drive? No – I've set it up both ways, and it works fine in both cases
13. Agenda What VHDs do for Windows 7 Native VHD support in Win 7 intro Creating VHDs step by step Attaching VHDs (nope, it ain't "mounting") Boot from VHD (BFV) Simple "add a second image via VHD" steps Bcdedit in detail: BFV's screwdriver and wrench Expert boot from VHD setup – boot your computer from one file 13
14. Originally a Format for VM Disks VHDs were (and still are) a useful format for storing virtual machines – when you power down a VM, basically it's nothing but a bunch of files Virtual machines can have more than one imaginary hard disk, and each of those imaginary hard disks are stored in a file format with the quite sensible extension ".vhd"
15. VHDs Store Structures and ACLs A VHD-format file can be a handy way to package an entire drive into one file, incorporating the folder structure and its NTFS permissions – way more useful than a ZIP file! Thus, they can provide "non-virtual service" replacing ZIP and CAB files
16. Snapshots Assist Backups Virtual machine managers support the notion of "snapshots," a way to store the entire state of a VM that is both quick and that doesn't burn up a lot of hard disk space (Consider how large VMs are and how quickly snapshots happen!) VHDs, then, offer a useful format for backups and maintaining many incremental backups, as we see in Vista/Win 7's "CompletePC Backup"
17. And the Most Interesting Part… Windows 7 lets you package an entire bootable Windows system drive into a single large VHD Place that VHD onto a system's otherwise-empty hard drive (with a BCD folder) And then you can boot the system from that one big hard disk Again, not a "virtual" application at all
18. First, Some Pictures There's a lot to learn here, but let me do a quick overview of one of the outcomes of native VHD support Consider this the "10,000 foot view" of something that I will later explain step by step It presents what is perhaps the simplest-to-see design (if not the simplest to create!)
19. VHD Boot Setup: "Big Picture" Start off with a clean hard disk, a WIM of the System Reserved Boot Partition and a VHD containing a Windows OS partition (you have to create those yourself, more info on that later) Boot WinPE Using DiskPart, chop it up 19
20. VHD Boot Setup : "Big Picture" 100 MB R: Create two partitions: a 100 MB active partition, give it any drive letter (let's call it R:) 20
21. "R:?" Doesn't the drive letter matter? No – as we've seen, the system reserved boot partition won't have a drive letter eventually anyway We just need a drive letter now so that ImageX can do the next step
22. VHD Boot Setup : "Big Picture" Get the boot manager code into the small partition with Setup or ImageX 100 MB R: SRBM.wim SRBPM.wim
23. VHD Boot Setup : "Big Picture" 100 MB SRBP Then, use the rest to create a partition, format it and call it drive S: (again, the letter doesn't matter, but I'll use S: in this example) S:
24. VHD Boot Setup : "Big Picture" Create a folder on S: and copy an already-created Win 7 VHD which I've called image.vhd (and that I'll explain how to create later) to the folder 100 MB SRBP S: image.vhd
25. Notice the "Copy" If you've already got an OS image inside a VHD, then "deploying" it is as simple as XCOPYing the VHD file… no Ghost, no ImageX (Again, we'll see how to create a VHD with an OS image in it in a moment) Note also: We've got a drive S: that contains the file s:hdsmage.vhd that we want to boot from Then we'll do some bcdedit (details later) And reboot…
26. After You Reboot: "Big Picture" As before, the 100 MB partition has no letter S: has been renamed to some other letter just above C:, like D: or E:, and has just one file in it The attached VHD – which is just a VHD file sitting in a folder on "E:" – now shows up as a separate C: drive with the OS on it 100 MB SRBP E: C: image.vhd
27. What it looks like when booted So on to the details!
28. Native VHD Supportwhat Win 7/R2 can do Win 7 lets you create, from the CLI or (less completely) the GUI a brand-new VHD You can then access it by "attaching" it, which fools Windows into thinking that you've just added a new physical hard disk to the system You can then partition it, format it, etc From that point on, any other system that attaches that VHD sees its partitions, NTFS security and the like
29. VHD Attachmentsimpler example that we can quickly see Take a computer with one physical hard disk and just one volume on that disk (except the hidden partition) We'll carve out a 1 GB fixed-size VHD file named "image.vhd" from C: Then we'll partition it, format it and make it drive D: with a volume label of "VHD Disk" or the like
30. Win 7 VHD Workflowwhat we'll do to create the "extra" drive Initially create a VHD with logical disk manager (LDM), diskpart or, in some cases, start from an existing VHD Following that, "select" the VHD Then you "attach" the VHD Once it's attached, it looks like a new hard drive Now you treat it just like a regular drive – partition it, format it, etc
31. Using Win 7's VHD Supportoverview (command line, all in diskpart) Create VHDs from create vdisk file=… Connect to a VHD file with select vdisk file=… Then view it as if it were a physical with the attach vdiskcommand Once it's attached, you can treat it like a physical disk – create/delete partitions and volumes, format the volumes, give them a letter
33. Three Kinds of VHDs Fixed: when you create the VHD, you tell Windows how large it should be, and that space gets allocated immediately Expandable: when created, you tell Windows the VHD's maximum size, but Windows only actually allocates the space as needed Differencing: based on an existing "parent" VHD, this is a space-saving way to create several VHDs that are based on a "baseline" VHD
34. Creating a VHD: CLI From the CLI: diskpart create vdisk file=filename maximum=sizeinmegabytes [type=fixed|expandable] (we'll skip differencing for now) ex: create vdisk file="c:hdsmage.vhd" maximum=1000 "Fixed" is default, "expandable" can be much faster for big VHDs
35. Selecting a VHD: CLI Necessary intermediate step in using diskpart on a VHD Also, it's the first step if you want to use a VHD that you got from somewhere else Connect to a VHD file in diskpart with "select vdisk file=filename" – example: select vdisk file=c:hdsmage.vhd No options
36. Attaching a VHD: CLI Next, a simple one: attach vdisk Attaches whatever disk you named in the last command Can take "readonly" as an option, or create new in-the-vdisk permissions with the "usefilesd" or "SD=" options Now it's like you have an extra hard drive on your system… partition it, give it drive letters
43. Boot From VHD: Basics We've seen that a VHD can "become" a disk But what if that disk contained a bootable operating system image? Then you could (with Windows 7 Ultimate or Enterprise) tell Windows at boot time to automatically attach the VHD, essentially "unpacking it on the fly" and booting from the OS inside that VHD Better: you could have several VHDs for multi-boot, and deploying is basically XCOPYing
44. First, We Need a VHD with a System Image The VHDs that we'll deploy contain an operating system image, (although with some work you could probably use a a VHD from an existing VM) so let's see how to create that Start from a WIM (create with ImageX, newsletter #60) and a VHD (which we just saw how to create) Attach the WIM so it's got a drive letter Use ImageX /apply to apply the WIM to the VHD
45. Example: Creating a VHD with a System Image Suppose I've created "image.vhd" which is at least 24 GB (it's got to hold a Win 7 image) attached as drive G:, no data in it so far And I've got a Win 7 image in "system.wim" as image number 1 (best if sysprepped, of course) Then I just type ImageX /apply system.wim 1 g: /verify This can then be copied to a target system and booted from
46. The Basic VHD Boot We'll essentially employ just two steps to add a second bootable image to a computer using a VHD with a system image on it: Copy the VHD to a local hard drive on the system (for example put "image.vhd" into C:HDs) Use BCDEDIT to create a new OS entry and point that entry at the VHD
47. Installing a VHD image to boot from Start from a system running R2 or Win 7 Enterprise/Ultimate with enough space on a drive (any drive's fine, I'll use C:) to store an extra OS image Copy a VHD file containing a Win 7 system image onto that drive (in my example, I'm copying image.vhd into C:HDs) And now, do a bit of relaxation breathing so we can tackle BCDEDIT
48. Where BCDEDIT Fits In Remember the 100 MB boot partition? For the first few seconds, that is the only code running, and bcdedit is the main tool to tell it what to do Windows Setup configured bcdedit to boot (usually) from c:indowsystem32inload.exe But Win 7's boot partition can do the VHD stuff, if we tell it to The only problem is that the syntax is pretty ugly… so here goes!
49. Using BCDEDIT First, start from an elevated command prompt and type "bcdedit /v" to see the current state of boot instructions; there will always be at least two – ignore the first, as it's a set of overall commands We need the "/v" to get the long ugly GUID for the current OS entry In this case, it turned out to be {f177696b-7ee6-11de-a72e-f4251c6d1ab0} but yours will be different
51. BCDEDIT Setupour bcdedit tasks Here, we will Copy the one existing bootable OS entry Give it a new name Change its "device" and "osdevice" parameters (see previous screen shot for examples) to point to the VHD Optionally, tell it to rescan for plug and play changes with a "detecthal" parameter
52. BCDEDIT Setup To copy the current OS entry, type bcdedit /copy {GUID} /d "Boot from VHD" (Don't type "{GUID}," type your actual GUID) Now we need a new GUID, the one that Windows generated when we created this new OS entry It'll be reported in the bcdedit output; we'll note it (actually, I copy it into the clipboard for easy typing later) for the next commands
53. BCDEDIT Setup In my case, it ran like this: C:amp;gt;bcdedit /copy {f177696b-7ee6-11de-a72e-f4251c6d1ab0} /d "Boot from VHD" The entry was successfully copied to {f1776970-7ee6-11de-a72e-f4251c6d1ab0}. So I copy the {f1776970-7ee6-11de-a72e-f4251c6d1ab0} GUID to the clipboard
54. BCDEDIT Setup Next, tell it where the boot device is, which looks like bcdedit /set {guid} device vhd=VHD-filespec Unfortunately this, too, is a bit ugly, as the drive letters will be different after the reboot, meaning the C:HDs ain'tgonna be on C:any more So surround the drive letter in brackets: bcdedit /set {f1776970-7ee6-11de-a72e- f4251c6d1ab0} device vhd=[C:]HDsmage.vhd
55. Almost Done… We next need the same command for a parameter named not "device" but "osdevice:" bcdedit /set {f1776970-7ee6-11de-a72e-f4251c6d1ab0} device vhd=[C:]HDsmage.vhd Finally, set "detecthal" on: bcdedit /set {f1776970-7ee6-11de-a72e-f4251c6d1ab0} detecthal on You can see those commands in this screen shot
57. Can't Figure Out the [Drive]? Sometimes typing in the current drive letter in the bcdedit /device/osdevice commands doesn't work so well In that case, there's a neat alternative that lets you tell the computer, "you go find the stupid VHD!" Instead of [C:] or [D:] or whatever, just type [locate], like bcdedit /set {guid} device vhd=[locate]hdsmage.vhd
58. Booting an Existing VHDsummary Copy the VHD (call it "image.vhd" in this example) – assume it's in c:HDs Create a new OS entry in bcdedit, copy from your current one with bcdedit /copy {current} /d "Boot Win7 VHD" That will result in a long GUID; copy that and do a bit of configuration: bcdedit /set {GUID} device vhd=[locate]mage.vhd bcdedit /set {GUID} osdevicevhd=[locate]mage.vhd
59. Adding A Second VHD So now we've got a complete "standard" Win 7 install and a VHD-based Win 7, allowing a mult-boot situation What if we want to add another VHD? No problem – just reproduce what we did here Except for the bcdedit hassles (which aren't bad once you've done them a few times and [locate] helps), this essentially allows "xcopy deployment" of extra images
60. The Final Step: VHDs Only (1) So we could imagine a system with, say, five images on it – one "standard," the other four "VHD" But what about a simpler arrangement: 100 MB partition Big C: drive with just one file on it… image.vhd?
61. Overview: Pure Boot From VHD Run Win 7 Setup Shift-F10 for a command prompt Wipe the hard disk Partition it with 100 MB partition, set active the rest as one large partition; format Create a HDs folder on the large drive Create, select, attach a 24+ GB VHD Point Setup at the new "drive" now available
62. Step by Steps Start Win 7 Startup Press shift-F10 to get a command prompt Commands to create 100 MB partition: diskpart select disk 0 clean create partition primary size=100
63. Step by Steps Create large drive (still in diskpart): create partition primary format fs=ntfs label="Cdrive" quick assign letter=s exit md s:HDs diskpart
64. Step by Steps this should look sort of familiar by now Create VHD, attach it and partition it create vdisk file="s:hdsmage.vhd" type=expandable select vdisk file="s:hdsmage.vhd" attach vdisk exit exit
65. Now for the trick You're back in Setup Run the install; where it asks, "Where do you want to install Windows?," look at the new space you created (the size is the clue, it's probably the last one) Setup will say "Windows cannot be installed to this disk. (Show details)" Click it an Next anyway; it'll install
66. What It Looks Like Set up roughly as we just did, here are the Explorer and Disk Manager views
67. Disk Manager View Remember, there's really only one hard drive here; "Windows 7 Image" is really a VHD file in "C Physical"
70. Explorer View: E: This is the only folder on C:, containing just one VHD file
71. All-VHD Gotchas: Insomnia In my experience, running a system from VHD does have a couple of down-sides: hibernate seems not to work you can't put a system to sleep
73. What's New Nothing major – this is basically the Vista/2008 backup tool Backup and Restore isn't in Accessories, it's in Control Panel / System and Security / Backup and Restore / Create an image backup You can also "Create a system repair disc," a WinRE CD/DVD from Control Panel (System and Security / Backup and Restore / Create a system repair disc"
74. Difference From Vista If you use Win 7's backup to do "bare metal" backups from the "wbadmin" CLI then be sure to include the "-allcritical" switch to ensure that the unlettered volume gets backed up, as in this example wbadmin start backup –backuptarget:m: -allcritical –include:e:
75. What's New in Server Backup System State Backup (on 2008 R2) uses VSS now and is five times faster than Server 2008; no corresponding changes in W7, as SSB isn't meaningful on a desktop OS Particular file/folder backup (as Vista had but Server 2008 did not) is in Server 2008 R2 Still no tape or Exchange backup capability
76. Short Storage Items… Built-in support for burning ISOs to CD, DVD and Blu-Ray Command-line tool in System32; syntax: isoburn /q [burner drive letter:] [file to burn] Example: isoburn /q e: myimage.iso Also there's shell support built-in No native ability to mount ISOs, though, although it may yet appear in the final version?
77. Short Storage Items… DFS and FRS are, believe it or not, not just deprecated but gone from 2008 R2 apparently Exception is if you're still using FRS for Sysvol You can now do RAID 1 (mirroring) on the desktop OS, Windows 7
78. Thank You! I am at help@minasi.com Find out about my free newsletter and online www.minasi.com Please take a moment and do an evaluation