This is the first post in my series about the new features in Windows Server 2008 R2. As in my series about the new features of Windows 7, I will update the articles when I learn about new features. I will discuss some of the new features in more detail soon. Essentially, the term "virtualization" covers three different technologies in Windows Server 2008 R2: Server Virtualization, Desktop Virtualization, and Presentation Virtualization. Server Virtualization is based on Hyper-V 2.0, which will get quite a few interesting new features. The virtualization technology ehind Desktop virtualization, i.e., Virtual Desktop Infrastructure (VDI), is also Hyper-V. This is probably the most important new feature in Windows Server 2008 R2. Presentation Virtualization is nothing but the good old Terminal Server. Technically, I find it a bit odd to use the term "virtualization" in this context, but from a marketer's point of view, it probably makes a lot of sense. Note that Microsoft renamed the "Terminal Services" as "Remote Desktop Services" in Windows Server 2008 R2.
Applying Novell Identity Manager to Your Everyday ProblemsNovell
In this session, you will hear from experts on the best way to approach the password management/self service and the web services - two of the most common use cases for Novell Identity Manager.
This session will remove the mystery from installing the UserApp and configuring password self-service, including a number of procedures that exist only in scattered technical information documents (TIDs). You will take away a set of proven procedures that will help you prepare password self-service for your end users and learn how to provide a simple URL for password self-service that's easy for end users to remember.
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)Intergen
We ran the "Windows Accelerate IT Pro Bootcamp" one day hands-on workshop in early June 2014. These eight modules were designed to get IT managers, project managers, sysadmin and devops up to speed with the new Windows 8.1 and Office 2013. The bootcamp focused on how to move off earlier versions of Windows and Office to a modern desktop and tablet platforms with the latest security and mobility technologies.
Keep an eye in our SlideShare feed for all eight modules:
Windows Accelerate IT Pro Bootcamp: Introduction (Module 1 of 8)
Windows Accelerate IT Pro Bootcamp: Platform Delivery (Module 2 of 8)
Windows Accelerate IT Pro Bootcamp: Windows ToGo (Module 3 of 8)
Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)
Windows Accelerate IT Pro Bootcamp: UE-V (Module 5 of 8)
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)
Windows Accelerate IT Pro Bootcamp: Devices (Module 7 of 8)
Windows Accelerate IT Pro Bootcamp: Closing (Module 8 of 8)
For other events (Intergen or Microsoft Community) check our events page at http://www.intergen.co.nz/upcoming-events/
Installing and Configuring Novell ConferencingNovell
An investment in Novell Conferencing delivers immediate payback by helping you reduce the costs and downtime involved in employee travel. Attend this session to learn how you can install and configure the product and begin realizing value right out of the box. This advanced technical session will cover installation steps, configuration tips and tricks, and detailed recommendations for managing this innovative conferencing solution so you can start saving immediately.
Speaker: Prakash Khot CTO
Dimdim
IBM WebSphere DataPower B2B Appliance XB62 -
Increase the speed and reliability by centralizing and consolidating business- to-business (B2B) trading-partner connectivity with a purpose-built, DMZ-ready B2B Gateway. http://ibm.co/HV0tNx
This is the first post in my series about the new features in Windows Server 2008 R2. As in my series about the new features of Windows 7, I will update the articles when I learn about new features. I will discuss some of the new features in more detail soon. Essentially, the term "virtualization" covers three different technologies in Windows Server 2008 R2: Server Virtualization, Desktop Virtualization, and Presentation Virtualization. Server Virtualization is based on Hyper-V 2.0, which will get quite a few interesting new features. The virtualization technology ehind Desktop virtualization, i.e., Virtual Desktop Infrastructure (VDI), is also Hyper-V. This is probably the most important new feature in Windows Server 2008 R2. Presentation Virtualization is nothing but the good old Terminal Server. Technically, I find it a bit odd to use the term "virtualization" in this context, but from a marketer's point of view, it probably makes a lot of sense. Note that Microsoft renamed the "Terminal Services" as "Remote Desktop Services" in Windows Server 2008 R2.
Applying Novell Identity Manager to Your Everyday ProblemsNovell
In this session, you will hear from experts on the best way to approach the password management/self service and the web services - two of the most common use cases for Novell Identity Manager.
This session will remove the mystery from installing the UserApp and configuring password self-service, including a number of procedures that exist only in scattered technical information documents (TIDs). You will take away a set of proven procedures that will help you prepare password self-service for your end users and learn how to provide a simple URL for password self-service that's easy for end users to remember.
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)Intergen
We ran the "Windows Accelerate IT Pro Bootcamp" one day hands-on workshop in early June 2014. These eight modules were designed to get IT managers, project managers, sysadmin and devops up to speed with the new Windows 8.1 and Office 2013. The bootcamp focused on how to move off earlier versions of Windows and Office to a modern desktop and tablet platforms with the latest security and mobility technologies.
Keep an eye in our SlideShare feed for all eight modules:
Windows Accelerate IT Pro Bootcamp: Introduction (Module 1 of 8)
Windows Accelerate IT Pro Bootcamp: Platform Delivery (Module 2 of 8)
Windows Accelerate IT Pro Bootcamp: Windows ToGo (Module 3 of 8)
Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)
Windows Accelerate IT Pro Bootcamp: UE-V (Module 5 of 8)
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)
Windows Accelerate IT Pro Bootcamp: Devices (Module 7 of 8)
Windows Accelerate IT Pro Bootcamp: Closing (Module 8 of 8)
For other events (Intergen or Microsoft Community) check our events page at http://www.intergen.co.nz/upcoming-events/
Installing and Configuring Novell ConferencingNovell
An investment in Novell Conferencing delivers immediate payback by helping you reduce the costs and downtime involved in employee travel. Attend this session to learn how you can install and configure the product and begin realizing value right out of the box. This advanced technical session will cover installation steps, configuration tips and tricks, and detailed recommendations for managing this innovative conferencing solution so you can start saving immediately.
Speaker: Prakash Khot CTO
Dimdim
IBM WebSphere DataPower B2B Appliance XB62 -
Increase the speed and reliability by centralizing and consolidating business- to-business (B2B) trading-partner connectivity with a purpose-built, DMZ-ready B2B Gateway. http://ibm.co/HV0tNx
RingCube vDesk is a high-performance enterprise desktop virtualization solution that simplifies the creation, access and management of Windows desktops through Workspace Virtualization.
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?eG Innovations
A growing number of companies are virtualising desktop environments to reduce cost and boost flexibility. The dizzying array of available solutions can make the first step quite difficult - what virtualization technology is right for my organization? Citrix alone offers XenDesktop, XenApp and VDI in a box. While Citrix desktop virtualisation often seems like a simple project; user experience problems, delayed deployments, and cost overruns can quickly turn this project into a nightmare.
Join the webinar "Desktop Virtualisation Choices: Citrix XenDesktop, XenApp or VDI in a Box - How to Decide" and learn from UK Citrix desktop virtualization expert Andrew Wood (Gilwood CS Ltd) how to decide what virtualisation technology best fits your needs.
Hear how to determine what technology is right for you based on:
• Your goals for desktop virtualisation
• Number of users, applications, and profiles
• Existing infrastructure issues
• Cost of ownership vs. cost savings
• Performance and scalability considerations
VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3Digicomp Academy AG
In Kurzpräsentationen und Live-Demos wurden in der Präsentation folgende Themen vorgestellt:
Neuerungen in VMware Horizon View 5.3
- HTML-5-Zugriff
- Grafik-Beschleunigung (vSGA & vDGA)
- Vorschau vSAN-Technologie
Neuerungen in VMware Horizon Mirage 4.3
- Zentralisiertes Image-Management für physische und virtuelle Desktops
- Weitere Use Cases: OS/HW-Migrationen, Disaster Recovery, Backup, Restore
Neuerungen in VMware Horizon Workspace
- Zugriff auf Anwendungen und Daten von jedem beliebigen Gerät
- Zentrale Bereitstellung, Verwaltung und Sicherung dieser Ressourcen durch die IT
Enterprise-Mobility-Management für Android und iOS
Die Aufzeichnung des Referats finden Sie im YouTube-Channel von Digicomp: http://www.youtube.com/user/DigicompAcademy
RapidScale DaaS offering allows companies of all sizes to move their desktops into the cloud eliminating PC maintenance, support, and life cycle management.
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
Thinking about SDN and whether it is the right approach for your organization? Have you heard about Cisco’s Application Centric Infrastructure and F5 Synthesis yet? The path to radically simplify and accelerate application deployment and datacenter agility can be a phased approach that leverages your existing investment. Rapid delivery of applications to anyone, anywhere, at any time is complex—and many businesses struggle with it.
Consolidation Planning: Getting the Most from Your Virtualization InitiativeNovell
During this session, you'll get an in-depth look at the principles and best practices of planning a server consolidation project. You will learn how to ensure projects meet goals such as minimizing new hardware purchases or rack space, how and when to use different strategies such as scale up versus scale out, and how to prove those goals were met after the project is finished.
Novell ZENworks technologies have been in use for over a decade, and the future has never been brighter. This session will focus on Novell ZENworks Configuration Management and the upcoming version 11 release. It will also cover new developments in the product line, such as Linux device management, advanced power management tools and integrated endpoint security capabilities. Finally, we'll provide a roadmap review that details upcoming releases for other products in the Endpoint Management portfolio.
Using Hard Disk Encryption and Novell SecureLoginNovell
Laptop theft is one of the most common crimes in industrial countries. Therefore, the demand for laptop security and the need to protect confidential data on hard disks is increasing. Several products on the market address this issue by offering hard disk encryption combined with login security. This session will show how these solutions can be integrated into a Novell environment.
A typical scenario might look like the following: The digital certificates used for encryption are generated in Novell eDirectory; the certificates are used with smartcards, which are also managed in eDirectory. The configuration of the hard disk encryption solution is deployed to clients with Novell ZENworks (no user interaction is necessary during installation and configuration). The hard disk encryption registration is combined with Novell SecureLogin, which results in a single sign-on.
This session will describe in detail what the configuration of hard disk encryption in such a scenario looks like, and will feature a live demonstration. The presenters are independent consultants with no interest in marketing a particular hard disk encryption solution.
The explosion of IP-enabled mobile devices has made today’s enterprise networks more complex and dynamic than ever before. To effectively manage and control these networks, IT organizations need a comprehensive, automated, and consolidated IP address management solution.
Learn why we think SolarWinds IP Address Manager is a better solution than Microsoft Windows Server 2012 when it comes to IP space management in today’s enterprise networks.`
RingCube vDesk is a high-performance enterprise desktop virtualization solution that simplifies the creation, access and management of Windows desktops through Workspace Virtualization.
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?eG Innovations
A growing number of companies are virtualising desktop environments to reduce cost and boost flexibility. The dizzying array of available solutions can make the first step quite difficult - what virtualization technology is right for my organization? Citrix alone offers XenDesktop, XenApp and VDI in a box. While Citrix desktop virtualisation often seems like a simple project; user experience problems, delayed deployments, and cost overruns can quickly turn this project into a nightmare.
Join the webinar "Desktop Virtualisation Choices: Citrix XenDesktop, XenApp or VDI in a Box - How to Decide" and learn from UK Citrix desktop virtualization expert Andrew Wood (Gilwood CS Ltd) how to decide what virtualisation technology best fits your needs.
Hear how to determine what technology is right for you based on:
• Your goals for desktop virtualisation
• Number of users, applications, and profiles
• Existing infrastructure issues
• Cost of ownership vs. cost savings
• Performance and scalability considerations
VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3Digicomp Academy AG
In Kurzpräsentationen und Live-Demos wurden in der Präsentation folgende Themen vorgestellt:
Neuerungen in VMware Horizon View 5.3
- HTML-5-Zugriff
- Grafik-Beschleunigung (vSGA & vDGA)
- Vorschau vSAN-Technologie
Neuerungen in VMware Horizon Mirage 4.3
- Zentralisiertes Image-Management für physische und virtuelle Desktops
- Weitere Use Cases: OS/HW-Migrationen, Disaster Recovery, Backup, Restore
Neuerungen in VMware Horizon Workspace
- Zugriff auf Anwendungen und Daten von jedem beliebigen Gerät
- Zentrale Bereitstellung, Verwaltung und Sicherung dieser Ressourcen durch die IT
Enterprise-Mobility-Management für Android und iOS
Die Aufzeichnung des Referats finden Sie im YouTube-Channel von Digicomp: http://www.youtube.com/user/DigicompAcademy
RapidScale DaaS offering allows companies of all sizes to move their desktops into the cloud eliminating PC maintenance, support, and life cycle management.
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
Thinking about SDN and whether it is the right approach for your organization? Have you heard about Cisco’s Application Centric Infrastructure and F5 Synthesis yet? The path to radically simplify and accelerate application deployment and datacenter agility can be a phased approach that leverages your existing investment. Rapid delivery of applications to anyone, anywhere, at any time is complex—and many businesses struggle with it.
Consolidation Planning: Getting the Most from Your Virtualization InitiativeNovell
During this session, you'll get an in-depth look at the principles and best practices of planning a server consolidation project. You will learn how to ensure projects meet goals such as minimizing new hardware purchases or rack space, how and when to use different strategies such as scale up versus scale out, and how to prove those goals were met after the project is finished.
Novell ZENworks technologies have been in use for over a decade, and the future has never been brighter. This session will focus on Novell ZENworks Configuration Management and the upcoming version 11 release. It will also cover new developments in the product line, such as Linux device management, advanced power management tools and integrated endpoint security capabilities. Finally, we'll provide a roadmap review that details upcoming releases for other products in the Endpoint Management portfolio.
Using Hard Disk Encryption and Novell SecureLoginNovell
Laptop theft is one of the most common crimes in industrial countries. Therefore, the demand for laptop security and the need to protect confidential data on hard disks is increasing. Several products on the market address this issue by offering hard disk encryption combined with login security. This session will show how these solutions can be integrated into a Novell environment.
A typical scenario might look like the following: The digital certificates used for encryption are generated in Novell eDirectory; the certificates are used with smartcards, which are also managed in eDirectory. The configuration of the hard disk encryption solution is deployed to clients with Novell ZENworks (no user interaction is necessary during installation and configuration). The hard disk encryption registration is combined with Novell SecureLogin, which results in a single sign-on.
This session will describe in detail what the configuration of hard disk encryption in such a scenario looks like, and will feature a live demonstration. The presenters are independent consultants with no interest in marketing a particular hard disk encryption solution.
The explosion of IP-enabled mobile devices has made today’s enterprise networks more complex and dynamic than ever before. To effectively manage and control these networks, IT organizations need a comprehensive, automated, and consolidated IP address management solution.
Learn why we think SolarWinds IP Address Manager is a better solution than Microsoft Windows Server 2012 when it comes to IP space management in today’s enterprise networks.`
Citrix unterscheidet wieder zwischen XenApp 7.5 und XenDesktop 7.5. Aber keine Angst, beide Produkte verwenden die gleiche Technologie wie in XenDesktop 7.1, die Flexcast-Management-Architektur. Also keine IMA-Dienste und Zonen-Data-Kollektoren mehr.
Neu wird es auch möglich sein, die Citrix-Lösungen in hybride oder öffentliche Clouds zu integrieren, wie zum Beispiel Amazon Web Services oder Windows Azure. Daneben werden auch andere Produkte wie AppDNA, Mobile Device Management oder die neuste Protokoll-Errungenschaft Framehawk in der kommenden Version je nach Lizenzversion integriert sein.
Slides zum Referat von Stephan Pfister.
ILANTUS gives you the perfect password manager — Password Express, an easy-to-use password management solution for smooth, uninterrupted access to any enterprise and SaaS applications. Our solution leverages our domain expertise to resolve deadlocks encountered by users, Service Desk personnel, and security administrators to ensure smooth functioning of your organization.
In addition to reducing costs and Service Desk call volumes, Password Express also takes care of security with its efficient automated policy administration.
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPrimend
IT halduse lihtsustamiseks on lisandunud mitmeid mõnusaid uuendusi. Andres Nurk rääkis põhilisematest nagu: Windows Server 2016, Windows 10 E3, ATP, OMS. Uuenduste tuules on muutunud ka WinServeri litsentsimine. Aleksei Räim andis kiire ülevaate, mida peab silmas pidama.
OCS LIA. The intergration of the Enterasys NAC Solution and Siemens Enterprise Networking - Totally Intergrated Security Architecture
The first technical intergration that provides a truely unique proposition when combining an Enterasys NAC solution with a SEC UC solution
azure track -03- it pros meet azure - againITProceed
by Kristof Rennen, Mike Martin
IaaS in the public cloud, the final frontier. These are the voyages of the Enterprise IT team, it's mission: to be scalable and agile as possible. To achieve their mission goal they can use the new features of Microsoft Azure:
•Azure Files
•Azure RemoteApp
•the new VNET features and it's big brother ExpressRoute
•and much much more
don't forget: Azure goes to Infinity and … beyond!
Machine Learning con Azure Managed InstanceEduardo Castro
En esta presentación mostramos las opciones para implementar Machine Learning dentro de Azure, así como las formas de configurar y utilizar Python dentro de Azure Managed Instance
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
3. Pinning Enhancements
• Replaces the Quick Launch
taskbar
• A pinned application’s Jump List
includes it most frequently and
recently used destinations
• Additional files and destinations
can be pinned to the application • You can pin a program from the Start
menu to the taskbar
• Group policies can control the
pinning functionality • You cannot pin a program from the
taskbar to the Start menu
4. How to Automatically
Arrange Windows
Desktop controls enable you to customize how windows are arranged on your desktop.
Refer to the option in the
Control Panel’s Ease of
Access Center.
• Types of automatic window arrangements include:
• “Shake” a window to focus on a single item on the desktop
• “Snap” a window to:
• Arrange windows side-by-side
• Expand windows vertically on the desktop
• Maximize windows on the desktop
5.
6. Top View selector
Library header
• Libraries organize and Manage locations
display the files on local
computers and other
computers and servers on
the corporate network
Windows 7 provides a
default set of libraries
Users can create new
libraries to meet specific
business requirements
Each library has specific top
views
• Libraries are automatically
indexed for faster viewing
and searching Federated
Search Libraries`
7. Overview of Search Federation
MOSS 2007
Team Sites AX
CRM
NAV
GP Line of
Business
applications
My Documents EMC
Document
Repository
E-mail Corporate Index
Local Machine Intranet Internet
8. Search Federation Security
No new authentication for Search Federation
Authentication is built on the Windows Authentication stack
Supporting NTLM, Basic over HTTPS, Kerberos
Users find only the data they can access
10. Windows XP Mode for Windows 7 makes it easy to install and run
many of your Windows XP productivity applications directly from a
Windows 7-based PC.
It utilizes virtualization technology such as Windows Virtual PC to
provide a Virtual Windows XP environment for Windows 7.
Windows XP Mode provides a 32-bit Windows XP Professional Service
Pack 3 (SP3) environment pre-loaded on a virtual hard disk. Client
virtualization software, like Windows Virtual PC is a pre-requisite to use
Windows XP Mode.
14. Always-on Secure Manageable Lower TCO
Internet
connectivity Encrypted by Simplified edge
equals Enterprise default Wizard-based policies
connectivity installation and
policy creation
Policy-based
Connects Application or Reduced user
automatically Server level overhead
controls
Allows
Adapts to Fully supports management of No need for
changing smartcard remote clients per–application
networks authentication gateways
16. Secure
Encrypted by default
Works with Smartcards
Granular access control through
Server and Domain Isolation
Servers or Apps available to
certain users
Servers or Apps NOT available
when remote
Coexists with existing
edge, health, and
access policies
18. Lower Cost Of
Ownership
Whether inside or out
Same policies
Policies based on identity
not location
Same user experience
Reduces complexity for the user
Reduces helpdesk calls
No need for application specific gateways
19. DirectAccess Versus Remote Access
Solutions
Scenario Traditional SSL VPN TS gateway Outlook Web DirectAcces
VPN Access s
Always on No No No No Yes
Remote Limited Limited No No Yes
management
Applications All All IT Pro Email only All
supported published
Per app server No Maybe Yes No Yes
policy
Edge policies Complex Complex Medium Simple Simple
Managed/ Both Both Primarily Primarily Managed
Unmanaged unmanaged unmanaged only
PCs
DirectAccess complements other remote access solutions
20. Internet
DirectAccess Client DirectAccess Server
Tunnel over IPv4 UDP,
HTTPS, etc.
Encrypted IPsec+ESP
Native IPv6
IPsec Gateway
6to4
Teredo
IP-HTTPS
21. Enterprise
DirectAccess Server Network Line of Business
Applications
IPsec Integrity
Only (Auth)
IPsec Integrity +
IPsec Gateway Encryption
22. Industry Trends
Assume the underlying network is always
unsecure
Redefine corporate edge to cocoon the
datacenter and business critical resources
Enterprise
Users are remote at all times
Network
DirectAccess
Server
Internet
Data Center and
Business Critical Local
Resources User
Remote
User
23.
24. DirectAccess DirectAccess Application Servers
Clients Servers
Requires Windows 7 Requires Windows Server End-to-end encryption
2008 R2 requires Windows Server
2008 or later
Other models can use
Windows Server 2003
or later
Must have an
IPv6 address
27. Provides seamless and consistent VPN connectivity
Enables IT Professionals to manage remote computers
outside of the office
Uses IKEv2 technology to supply constant VPN connectivity
Automatically re-establishes a VPN connection when users temporarily
lose Internet connections
Benefits Users who connect using wireless mobile broadband most, from
this capability
Transparent to users
28. Reduces Wide Area Network (WAN) link
utilization
Completely transparent to the user
Supports end-to-end encryption between
clients and servers
HTTP, SMB and BITS protocols are
optimized
Two deployment models:
Distributed mode
Hosted caching
29. 2. Second client
downloads identifiers
from main office server
Client 1
Main
Office
1. First client downloads Branch Office Client 2
data from main office
server
3. Second client searches
local network for data and
downloads from first client
30. 4. Second client
downloads from
2. Content pushed to hosted hosted cache
cache from first client
Client 1
Main
Office
1. First client downloads Client 2
Branch Office
data from main office
server
3. Second client
downloads identifiers
from main office server
31. Regional
Datacenter Support for read-only DFS
Read-only
Replica of DFS
Read/Write
Replica of DFS Branch Office
Provides a read-only, replica
copy of read/write DFS
resources Deletions are
not allowed
Prevents modifications
within branch office
33. Encrypt data on removable drives
Provided by BitLocker Drive Encryption
Store encryption keys in Windows Server
2008 R2 Active Directory
Windows Server 2008 R2
Active Directory
34. BitLocker ToGo
Encrypt removable storage (e.g. USB Keys)
Require USB Key encryption for write access
Windows 7 Enterprise/Ultimate SKUs
Universal Recovery Key: Data Recovery Agent
BitLocker partitioning done during setup
37. Problem Steps
Recorder
Started by end users to capture screenshots of
steps to reproduce an issue
Accompanying logs and software configuration
data is combined with the screen shots in a
compressed file
Actual key stokes are not recorded which
preserves the integrity of passwords
Output file has a 2 MB size limit
38. Gather relevant data to use troubleshooting and
debugging network connectivity problems
Collected Information Groups
Configuration Information State information
Event or Trace Logs Network traffic packets
Features
Use scenarios to enable related trace providers at one time
When tracing is stopped, an html report and an html .cab file
are generated
Unified tracing correlation engine builds lists of events that
are related to a specific activity ID
View lists using Netmon
39. Performance Monitor
New Features
Data Collector Sets
Wizards and templates for creating logs
Resource View
Reliability Monitor
Unified property configuration for all data
collection
User-friendly diagnosis reports
40. Windows PowerShell
2.0
• Built into Windows 7 Beta
• .NET managed scripting language
• Interactive command line shell and a graphical Integrated
Scripting Environment (ISE)
• ISE provides an environment to write, debug, and execute
Windows PowerShell scripts
• Supports branching, looping, functions, debugging,
exception handling, and internationalization
• One-to-many and one-to-one remoting capabilities
• cmdlets used to manage both Windows-based computers
and servers
43. Definition and Setup
AppLocker
Enables IT professionals to specify exactly what is allowed to
run on user desktops
Allows users to run the applications, installation programs, and
scripts that they need to be productive
Default rules
Make sure key operating system files run for all users
Prevent non-administrator users from running programs
installed in their user profile directory
Can be recreated at anytime
44. Default AppLocker rules:
• Ensure that the key operating system files are allowed to run for all users
• Prevent all non-administrator users from being able to run programs that are
installed in their user profile directory
Create default rules before manually creating new rules
or automatically generating rules for a specific folder
Default rules enable the following:
All users to run files in the default Program Files directory
All users to run all files signed by the Windows operating system
Members of the built-in Administrators group to run all files
45. Application Rules
Type Description Merge rule
If two path rules have
the same paths, they
Hash Uses the file hash of a file
are merged into a
single rule.
If two publisher rules
have the exact same
Uses a folder path or file
Path publisher and product
path
fields, they are
merged.
Publisher Uses the attributes of a No optimizations are
digitally signed file, like possible because
publisher or version each hash is unique.
47. Introduction to Windows 7
Deployment Tools
Tools and technologies to deploy Windows 7 included in:
Windows OEM Preinstallation Kit (Windows OPK)
Windows Automated Installation Kit (Windows AIK)
Windows Windows Windows Sysprep WDS ImageX
SIM Setup PE DISM
Answer Files (Unattend.xml, Oobe.xml)
Answer Files (Unattend.xml, Oobe.xml)
Windows Image (.wim) File
Windows Image (.wim) File
48. Overview of Dynamic
Driver Provisioning
• Ability to add and configure driver packages on the server and then
deploy them to client computers during installations based on their
hardware
• Ability to add drivers to boot images
49. Multicast Multiple Stream
Transfer
• Ability to transmit install images using multicasting
• Ability to automatically disconnect slow clients and divide
transmissions into multiple streams based on client speeds (boot
image must be Windows 7 or Windows Server 2008 R2)
X
50. Windows 7 Client
Virtualization Client Virtualization offers:
Client Virtualization can be:
• Client hosted (Virtual PC) •Better management of corporate
desktops
• Centralized on servers (Virtual •Flexible ways to respond to
Desktop Infrastructure / VDI)
various user needs
Windows 7 Improvements include:
• True multiple monitor support
Graphics
• Windows Aero support
• Bidirectional Audio support
Audio • Improved audio playback over low-latency
connections
Devices • Drivers availability in VDI
51. Deploying Windows 7 Beta on a
Virtual Hard Disk with Native
Boot Deploy VHD
Copy VHD to computer
Create VHD to run in VM
Prepare VHD
DiskPart Tool
Install Windows 7 Copy VHD to computer
Beta to the VHD to run in Native Boot
Disk Management
MMC Add a Native Boot VHD
to the Boot Menu
Attach VHD to the host
computer
Use WDS to deploy VHD
images for native boot
A native-boot VHD is a VHD that can be used
as the running operating system on a
computer without a parent operating system
52. Resumen
Windows Vista es (y Windows 7 será) el sistema
operativo Windows más seguro
Windows protege a los usuarios y a las
organizaciones
Windows 7 incluye importante cantidad de mejoras
que ayuda a proteger la información y a simplificar
el deployment
This module focuses on user productivity enhancements in Windows 7 Beta that are not purely end-user related. IT professionals must be familiar with the Windows 7 Beta desktop control mechanisms to effectively address end-user needs. Because Desktop Support Technicians might field calls from end-users asking why a specific window appears the way it does, or why the Notification area displays certain messages, they must understand what settings affect these behaviors and be able to explain and modify them. You should mention to the students that this training does not cover such enhancements as taskbar improvements, jump lists, and Aero peek. These are end-user related features that are outside the scope of this training because they do not require any type of setup or configuration by IT professionals. This training focuses two areas:Productivity enhancements that involve desktop control mechanisms.Advancements made to the Windows Search functionality.
To effectively explain this topic, you must have a good understanding of Jump Lists, which is a new feature in Windows 7 Beta. Jump Lists are not covered in this training because they are a desktop user interface enhancement designed for the end-user. However, because you can pin files and sites to a program’s Jump List, you must be able to demonstrate and explain Jump Lists so that students have a base of reference when you discuss pinning items to them. You should explain to students what a Jump List is, and how it has been incorporated into the Windows 7 Beta desktop experience.Discuss with the class the following advantages provided by the new Pinning functionality:Pinning makes it easier to customize the Windows desktop experience than Vista’s Quick Launch and Start Menu pinning, which were not easy to discover. Pinning delivers value over the existing solution of shortcuts on the desktop because pinned applications and destinations are always accessible from the top-level, and applications in particular are always accessible in a single click. Pinning provides a richer experience than desktop shortcuts and Vista’s Quick Launch and Start Menu pinning because it allows users to return directly to their most frequently or recently used destinations from a pinned application.Multiple files can be pinned to a single program icon using the pinned program’s Jump List. For example, rather than pinning several favorite word processing files to Quick Launch, you now can pin a single program icon to the desktop, and then pin the files you use most to the program’s Jump List.In previous versions of Windows, icons for the default web browser and e-mail program were pinned to the top of the Start menu. In Windows 7 Beta, the pinned area of the Start menu remains, but is empty for a cleaner look. However, you can still pin programs to the top of the Start menu just like in previous version of Windows. And because browsing the web and using e-mail are among the most common computer tasks, you can instead pin these programs, or any program, directly to the taskbar so you can open them more quickly and easily.Additional files and destinations can be pinned to the application by dragging and dropping the file/site to the pinned application’s Jump List. You should direct the students to the detailed training document for the complete list of new group policies that control the pinning functionality.Review the question from the Student Guide with the class:Question: What are the advantages of pinning your favorite Web sites to the Internet Explorer icon on your desktop?Answer: You can access the sites quicker without having to locate the sites from within Internet Explorer (IE) itself. Instead of having to open IE, search through a long Favorites list, and so on, you can simply view the Jump List for IE and then click on the site you want. . If needed, this opens IE and then takes you directly to the site, all at one time.
Perform the following steps to turn window arrangement options on and off:1. Navigate to Control Panel. Click Ease of Access Center. Under Explore all settings, click Make it easier to focus on tasks. 2. To turn automatic window arrangement off, scroll towards the bottom of the window and under Make it easier to manage windows, select the check box labeled Prevent windows from being automatically arranged when moved to the edge of the screen. To turn automatic window arrangement back on, clear the check box labeled Prevent windows from being automatically arranged when moved to the edge of the screen. If you have multiple windows open but just want to focus on a single one, you can “shake” a window back and forth to quickly minimize every other open window on the desktop . This can save time if you want to focus on a single item, without having to minimize all windows and then restoring the one window you want to focus on. Demonstrate to the students how to do this:To minimize all other open windows, click the menu bar of the window you want to keep open, and drag (or shake) the window back and forth quickly. The remaining windows minimize out of view. To restore the open windows, click the menu bar of the open window and drag the window back and forth again.Demonstrate to the students how to arrange windows side by side on the desktop:To snap a window to the side of the desktop, drag the title bar of a window to either the left or right side of the screen to expand the window to that half of the desktop. To return the window to its original size, drag the title bar away from the top of the desktop.Demonstrate how to expand windows vertically on the desktop:To expand a window vertically, point to the top or bottom edge of an open window until the pointer changes into a double-headed arrow, and then drag the border to the top or bottom of the screen to expand the window to the entire height of the desktop. To return the window to its original size, drag the title bar away from the top of the desktop.Demonstrate how to maximize windows on the desktop:To maximize a window, drag the title bar of a window to the top of the screen.To return the window to its original size, drag the title bar away from the top of the screen.Note: If you use multiple monitors, you can drag a maximized window from one monitor to another.Question: If your users are not comfortable with the ability to automatically arrange windows, do you know how to turn this feature off so they can return to the traditional processes of minimizing and maximizing windows?Answer: You use the same option for turning automatic window arrangement on and off. Follow the instructions presented earlier, but make sure you check the option to prevent automatic arrangement.
Navigation is intuitive and optimized around storage, and there is less overall clutter. You can now collapse nodes in the navigation pane and make it look even cleaner. This lack of clutter makes it easier to navigate around your personal files, drives, network shares, and so on. For example, plug in a USB key and it appears right away in the tree, so it is easy and faster to copy to. Mention to the class the primary search design goals, which included:Cleaner – Navigation is intuitive and optimized around storage; less overall clutterEasier – Improved relevance, search builder, and easy previews make searching and browsing easierSeamless – Libraries and federated search offer incredible power without learning a new UIYou should point to each of the improvements highlighted on the slide to draw attention to it. Explain to the class that Federated Search will be covered in the next lesson.Discuss how the following features are the reason remote corporate data is treated as a first-class citizen in the Windows 7 Beta user interface:Focus is on “my stuff”, not storage types or boundariesUsers get secure and flexible user access to networked dataIT can deploy preferred locations as Search Connectors or ScopesLightweight Client UI for accessing important dataNatural fit of search connectors and results into Windows ExplorerFile Dialog integrates new data access methods into application experienceReview the question in the Student Guide with the class:Question: Which of the enhancements identified on the slide do you think will have the greatest impact on your user base?Answer: Answers will vary depending upon each student’s experience.