70 Results Found
In this paper, we explore the basic usage of PowerShell in the pursuit of automating the management of Hyper-V deployments. This paper is targeted to IT professionals who have been "GUI-bound" to their management interfaces and have been working with or are embarking on the journey of Hyper-V administration. We'll explore the usage of Hyper-V specific cmdlets with the intent of ultimately being able to include multiple cmdlets in a "script" to allow for pushing one button and accomplishing the combined actions of many multiple mouse clicks in the GUI. No more repetitive tasks!
Interested in SharePoint 2013 developer training? Learn from SharePoint instructor Tracy Wallace, if you're ready and which SharePoint 2013 developer class you should take.
When we learn a concept for the first time, the newness of it tends to become embedded with the learning process. We remember the new idea's significance and forever after remember it as new. The initial impact of a discovery can prevent the concept from aging. At the same time, we realize how quickly technology advances. Is it time to evolve your expertise?
Nowadays, you can read weekly articles about security attacks and stolen data. Even leading companies and organizations are victims of cybercrime. Attacks can include breaches at three levels: the physical level, which includes social engineering, system and network and applications (e.g., web and mobile). In this complimentary webinar, you will discover the benefits of using automated solutions to detect application vulnerabilities, provide steps to remediate them and avoid costly compliance violation.
Like it or not, Internet of Things (IoT) is upon us. There are a number of factors that will impact its adoption rate, and the inevitable privacy (or lack of) discussions will likely happen sooner than later. This is going to change the world as we know it, in many cases for the better. But we will need to keep an eye on the extent to which it invades our personal lives if it is going to be the positive force it has the potential to be.
One of the most significant new features in Microsoft Windows Server 2012 is the Hyper-V Replica (HVR) capability. Whether you are considering this for your own organization or just prepping for your Windows Server 2012 MCSA, this white paper presents the essentials of deploying this disaster recovery feature.
Successful transformation initiatives are driven by Business Architecture. The Business Architect plays a key role in bringing all of the portfolio components together and consistently reinforcing senior management's voice throughout the ADM lifecycle. This begins with establishing strategic goals and outcomes that set the context for the entire program and service transformation. Establishing context serves as the basis for strategic project portfolio definition and integrated execution. This approach mitigates the risk of executing projects in isolation without considering the needs of the entire portfolio as a whole. This session will boost your knowledge of these concepts and help you and your team to achieve the best possible outcomes for your organization.
If you're running SharePoint 2010, learn how SharePoint 2013 is different and what you'll need to learn to deploy it effectively.
The Logical Volume Manager (LVM) is a powerful tool for managing storage on Linux servers. This video provides an overview of how LVM works and explores several ways that LVM makes storage management easier and more flexible. Examples include how to expand storage capacity on the fly using LVM and resize2fs, and how to migrate data from local storage to a storage area network (SAN) without downtime using pvmove.
With Forrester Research declaring "Waterfall processes have become obstacles to speed, quality and predictability," and more than 85% of CIO's surveyed by CIO Magazine using or planning to pursue Agile practices in 2014, this one-hour webinar will explore the basics of Agile and why so many organizations are adopting Agile methods.