Tuesday 29 December 2015

VMware: Quick stats on [SERVERNAME] is not up-to-date


<< Solution >>
1. Connect to the vCenter Server using the vSphere Client and administrator credentials.

2. Select Administration > vCenter Server Settings to display the vCenter Server Settings dialog box.

3. In the settings list, select Advanced Settings.

4. Add the following parameters:
vpxd.quickStats.HostStatsCheck = False
vpxd.quickStats.ConfigIssues = False

5. Restart the vCenter Server services.

Wednesday 16 December 2015

Microsoft: Microsoft Allowing OneDrive Users on Free Tier to Keep 15GB Free Storage and Camera Roll Bonus

Microsoft made the controversial decision to reduce its unlimited OneDrive storage to 1TB for Office 365 Home, Personal and University subscribers starting early next year. OneDrive's free storage will also be reduced from 15GB to 5GB, and the 15GB camera roll bonus will be discontinued.

Microsoft's decision was poorly received by OneDrive customers, who created an online petition called "give us back our storage" with over 70,000 votes. The backlash has prompted the company to apologize and introduce a new offer for OneDrive customers to keep their 15GB free storage and 15GB camera roll bonus.

Microsoft Group Program Manager Douglas Pearce (via The Verge):
" In November we made a business decision to reduce storage limits for OneDrive. Since then, we’ve heard clearly from our Windows and OneDrive fans about the frustration and disappointment we have caused. We realize the announcement came across as blaming customers for using our product. For this, we are truly sorry and would like to apologize to the community. […]

In addition, for our biggest fans who have been loyal advocates for OneDrive, we are adding a new offer that lets you keep your existing 15 GB of free storage when the changes happen next year. If you also have the 15 GB camera roll bonus, you’ll be able to keep that as well. From now until the end of January, you can sign up to keep your storage at the link below.
OneDrive users who sign up by January 31, 2016 will be able to keep their 15GB of free storage and 15GB camera roll bonus, even after Microsoft reduces its free storage tier to 5GB next year. OneDrive customers using more than 5GB of free storage will also receive a free Office 365 Personal subscription with 1TB storage for 12 months. "

Microsoft is not backing down from its larger plans to discontinue unlimited storage, a decision it made because a small number of users exceeded 75 TB storage, or 14,000 times the average, by "backing up multiple PCs and and storing entire movie collections and DVR recordings." The changes take place in early 2016.

Monday 14 December 2015

Microsoft: Install and Configure Google Chrome Silently via SCCM


The following process has been tested and confirmed working with Google Chrome and ConfigMgr / SCCM R2.

It does the following tasks:
- Install Google Chrome silently
- Set Google Search as the default search engine
- Does NOT set Google Chrome as the default browser
- No ‘Getting Started’ page
- No ‘Auto Update’
- Remove desktop shortcut

1. Download the latest version of the MSI install file from http://www.google.com/chrome/eula.html?msi=true

2. Create a text file called install.cmd and copy in the following information:
msiexec /qn /norestart /i "%~dp0GoogleChromeStandaloneEnterprise.msi"
if exist "c:\Program Files\Google\Chrome\Application\master_preferences" copy /y "%~dp0master_preferences" "C:\Program Files\Google\Chrome\Application\master_preferences"
if exist "c:\Program Files (x86)\Google\Chrome\Application\master_preferences" copy /y "%~dp0master_preferences" "C:\Program Files (x86)\Google\Chrome\Application\master_preferences"
reg add HKLM\Software\Policies\Google\Update /f /v AutoUpdateCheckPeriodMinutes /d 0
sc stop gupdate
sc config gupdate start= disabled

3. Create a text file called master_preferences and copy in the following information:
{
"homepage" : "http://www.google.com.au",
"homepage_is_newtabpage" : false,
"browser" : {
"show_home_button" : true,
"check_default_browser" : false,
"window_placement": {
"bottom": 1000,
"left": 10,
"maximized": false,
"right": 904,
"top": 10,
"work_area_bottom": 1010,
"work_area_left": 0,
"work_area_right": 1680,
"work_area_top": 0
}
},
"bookmark_bar" : {
"show_on_all_tabs" : true
},
"distribution" : {
"skip_first_run_ui" : true,
"show_welcome_page" : false,
"import_search_engine" : false,
"import_history" : false,
"create_all_shortcuts" : true,
"do_not_launch_chrome" : true,
"make_chrome_default" : false
}
}

4. Copy the MSI install file, master_preferences and install.cmd to your software package share

5. You can now create your SCCM package or deploy the software by using install.cmd

IT Technology: Java Error 1721 - There is a problem with this Windows Installer Package


<< Error Messages >>
While attempting to install Java, a message box with the following error appears:
Error 1721. There is a problem with this Windows Installer package. A program required for this install to complete could not be run. Contact your support or package vendor

<< Cause >>
Error 1721 is an Install Shield error code which indicates that the installation process has failed.

<< Solution >>
1. Disable/Configure any anti-spyware or anti-virus software on your system during the Java installation process.
2. Check to see if any spyware or adware is installed on your system blocking the completion of install process.
3. Check to see if you find any unwanted entry in Add/Remove Programs or Internet Explorer - Add-ons section (Tools - Internet Options - Programs - Manage Add-ons). If you found one, remove/disable this entry.
4. On Windows Vista, disable UAC (User Account Control) feature for your account and download and install the offline installation package.

IT Technology: Export Facebook Data Including Photos, Messages and ETC.


1. Go to account in your Facebook navigation.
    https://www.facebook.com/editaccount.php
2. Click on Download a copy of your Facebook data.
3. Click on Start My Archive at Download Your Information page.
4. By following the instruction given, you can now download all your information, including your photos and videos, posts on your wall, all of your messages, your friend list and other content you have shared on your profile.

Cisco: Deferred Releases


Deferred releases ( DF ) are not available for downloading because of known defects. These should not be installed on your Cisco devices. Furthermore, Cisco has stopped support on these IOS versions as they have too many bugs.

Friday 11 December 2015

IT Technology: Cisco VS Huawei Commands

CiscoHuawei
EXEC modeuser view
traceroutetracert
terminal length 0screen-length 0 temporary
showdisplay
show versiondisplay version
show history-commanddisplay history-command
show interfacesdisplay interface
show ip interfacedisplay ip interface
show ip routedisplay ip routing-table
show ip bgpdisplay bgp routing-table
show clockdisplay clock
show flashdir flash:
show loggingdisplay logbuffer
show snmpdisplay snmp-agent statistics
show usersdisplay users
show tech-supportdisplay diagnostic-information
write terminal,
show running-config
display current-configuration
more nvram:startup-config,
show startup-config
display saved-configuration
write erasereset saved-configuration
write memory,
copy running-config startup-config
save
clearreset
clear countersreset counters interface
clear interfacereset counters interface
clear access-list countersreset acl counter all
noundo
debug / no debugdebugging / undo debugging
reloadreboot
enablesuper
disablesuper 0
erasedelete
exitquit
configure terminalsystem-view
configuration modesystem view
endreturn
snmp-serversnmp-agent
hostnamesysname
router bgpbgp
router ospfospf
router riprip
shutdown / no shutdownshutdown / undo shutdown

Google: Disable Downloading, Printing and Copying for Any Files Stored in Google Drive

Google rolled out a small but significant addition to Google Drive. In short, you now have more control over the content you distribute via the service: You can now disable downloading, printing, and copying for any shared file.

The new option is available for any file stored in Google Drive, not just documents, spreadsheets, and presentations created with Google Docs. That means if you decide to upload, say, a PDF to Google Drive, you can lock it down before you share it with your friends or colleagues.

To use the feature, open the sharing dialogue from any Google Drive file and click on Advanced in the lower right corner. Check the “Disable options to download, print, and copy for commentators and viewers” box and click “Save changes.”

Note that you can’t choose to limit one or two of the three options: If you’re disabling downloading, you’re also disabling printing and copying. On the flip-side, developers can access this functionality through the Google Drive API.

Next, you can’t enable this feature if you don’t own the file. This makes sense: If a file is shared with you, you can’t then go ahead and disable downloading, printing, and copying for it. Being the file owner is a requirement (though if you really want, you could make a copy of the file, limit it, and then re-share it).

Finally, this feature removes all entry points for downloading, printing, and copying in not just Google Drive, but also Google Docs, Google Sheets, and Google Slides on all platforms. This is very much limited to the Google ecosystem: If you share the file via email, Google can’t help you.

A notification at the top of the File and Edit menus will let the user know a given file has been limited:

Google described the feature as “perfect for when the file you’re sharing contains sensitive information that you don’t want shared broadly or leaked.” That said, remember that you’re still sharing the file: If someone really wants, they can manually reproduce the content, or just screenshot each page.

This feature is meant as a deterrent and a reminder. It’s a way to communicate that the file owner doesn’t want the contents to be shared broadly.

“Disable options to download, print, and copy for commentators and viewers” is a neat addition, but it’s not a foolproof security or privacy feature.

IT Technology: Degradation of Fiber

Degradation is the loss of quality of an electronic signal, which may be categorized as either "graceful" or "catastrophic", and has the following meanings:
1. The deterioration in quality, level, or standard of performance of a functional unit.
2. In communications, a condition in which one or more of the required performance parameters fall outside predetermined limits, resulting in a lower quality of service.

There are several forms and causes of degradation in electric signals, both in the time domain and in the physical domain, including runt pulse, voltage spike, jitter, wander, swim, drift, glitch, ringing, crosstalk, antenna effect (not the same antenna effect as in IC manufacturing), and phase noise.

Degradation usually refers to reduction in quality of an analog or digital signal. When a signal is being transmitted or received, it undergoes changes which are undesirable. These changes are called degradation. Degradation is usually caused by:
1. Weather or environmental conditions
2. Terrain
3. Other signals
4. Faulty or poor quality equipment

A signal has two important factors: frequency and wavelength. If weather is fine and temperature is normal, the signal can be transmitted within given frequency and wavelength limits. The signal travels with velocity c ≤ 3*108 m/s, which is equal to the speed of light. For frequency f Hz and wavelength λ m, we have:

f = c/λ

So, when weather conditions deteriorate, frequency f has to be increased. This causes the wavelength λ to decrease, which means that the signal then travels lesser distance.

IT Technology: Signal Loss Calculation for Fiber

For multimode fiber, the loss is about 3 dB per km for 850 nm sources, 1 dB per km for 1300 nm. (3.5 and 1.5 dB/km max per EIA/TIA 568) This roughly translates into a loss of 0.1 dB per 100 feet (30 m) for 850 nm, 0.1 dB per 300 feet(100 m) for 1300 nm.
For singlemode fiber, the loss is about 0.5 dB per km for 1310 nm sources, 0.4 dB per km for 1550 nm. (1.0 dB/km for premises/0.5 dB/km at either wavelength for outside plant max per EIA/TIA 568)This roughly translates into a loss of 0.1 dB per 600 (200m) feet for 1310 nm, 0.1 dB per 750 feet (250m) for 1300 nm.


So for the estimated loss of a cable plant, calculate the approximate loss as:
(0.5 dB X # connectors) + (0.2 dB X# splices) + (fiber attenuation X the total length of cable)

A basic guideline for loss measurements is to estimate the loss using these approximate values:
Connector loss: 0.5 dB per mated pair
Splice loss: 0.2 dB per splice
Fiber loss:
Multimode: 3 dB/km @ 850 nm, 1 dB/km @ 1300 nm
Singlemode: 0.4 dB/km @ 1300 nm, 0.3 dB/km @ 1550 nm
For example: a 1.5 km multimode link with 3 connections @ 850 nm:
Loss = (1.5 km X 3 dB/km) + (3 conn X 0.5 dB)
Loss = 4.5 dB + 1.5 dB = 6 dB

Thursday 10 December 2015

Cisco: Active Directory Integration for Application Users in Cisco Unified Communications Manager (CUCM)


By default, on a non-integrated Cisco Unified Communications Manager (CUCM), there are two types of users: end users and application users:
1. End users — All users associated with a physical person and an interactive login. This category includes all IP Telephony users, as well as Unified CM administrators when you use the User Groups and Roles configuration (equivalent to the Cisco Multilevel Administration feature in prior Unified CM versions).
2. Application users — All users associated with other Cisco IP Communications features or applications, such as Cisco Attendant Console, Cisco IP Contact Center Express, or Cisco Unified Communications Manager Assistant. These applications need to authenticate with Unified CM, but these internal users do not have an interactive login. This serves purely for internal communications between applications, for example, CCMAdministrator, AC, JTAPI, RM, CCMQRTSecureSysUser, CCMQRTSysUser, CCMSysUser, IPMASecureSysUser, IPMASysUser, WDSecureSysUser, and WDSysUser.

When you integrate Cisco Unified Communications Manager with the Active Directory, the Directory Integration process uses an internal tool called Cisco Directory Synchronization (DirSync) on the Unified CM to synchronize a number of user attributes (either manually or periodically) from a corporate LDAP directory. When this feature is enabled, end users are automatically provisioned from the corporate directory.

* Note: Application users are kept separate and are still provisioned through the Unified CM Administration interface. In other words, application users cannot be synchronized from AD.

In summary, end users are defined in the corporate directory and synchronized into the Unified CM database, while application users are stored only in the Unified CM database and do not need to be defined in the corporate directory.

Cisco: Configure Interdigit Timeout to Reduce Dial Delay


In order to allow sufficient time for a user to dial a telephone number, Cisco CallManager relies on a timer referred to as the interdigit timeout. This parameter indicates the duration Cisco CallManager waits after each digit is entered before it assumes the user has finished entering digits. However, users of Cisco IP phone can encounter instances when Cisco IP phone takes several seconds to connect the call after dialing all the digits in the called party's phone number.

Cisco CallManager contains a service parameter that enables you to change the interdigit timeout value. You can easily configure this parameter. The default timeout is set to 10 seconds. If you do not modify the settings, the system waits 10 seconds after each digit for a new one to be introduced. Consequently, after the last digit has been inserted, the CallManager routes the call after 10 seconds. You can observe this especially on variable-length dialplan configurations. Please change the service parameter by following the steps below:
1. Select Service > Service Parameters to go to Cisco CallManager System Parameters from the Cisco CallManager Administration page.
2. Select the name of your server and service from the Server and Service fields.
3. Select TimerT302_msec.
4. In the Value field, type the timeout you want to configure (specify the time in milliseconds). For example, if you want to configure 7 seconds as the interdigit timeout, type 7000.
* Note: Do not set the interdigit timeout value too low, otherwise the user does not have enough time to enter the digits while calling.
5. Click Update.
6. Restart Cisco CallManager to implement the changes.

Microsoft: Skype for Business Cloud PBX


Most companies manage their telephone communications using a PBX (private branch exchange) system, which is essentially hardware that acts as a private telephone switchboard. Now, with Skype for Business Cloud PBX, you can eliminate separate PBX systems for users and move the functions of the PBX into the cloud, assign and manage phone numbers using Skype controls within your Office 365 admin console, and easily enable dial-in telephone numbers for your Skype meetings.

You can get phone numbers directly from Microsoft or port existing phone numbers into Skype for Business and assign or re-assign them to your users as needed. If your organization has hundreds or thousands of users, all of this can be automated via PowerShell scripting. So all of the communication needs of a new user—from email and collaboration to meetings and phones—can be automated and delivered straight from Office 365. Additionally, with PSTN Conferencing, an administrator can easily enable phone numbers to be added to their users’ Skype meetings, so anyone who receives the meeting request can dial in via a landline or mobile phone.

Cloud PBX also works with your existing carrier circuits with on-premises PSTN connectivity. In this configuration, you connect Skype for Business software to communicate between your existing PBX or PSTN Gateway and Cloud PBX in Office 365. This allows you to continue to use your carrier contract and circuit for phone calls while the users are hosted in Office 365.

Ideally, the connection between anything on-premises and online would be done using Azure ExpressRoute for Office 365, but you can use a normal Internet connection as well. Cloud PBX and PSTN Conferencing are included in Office 365 E5 or can be purchased standalone.

IT Technology: Difference between OTF (Open Type) and TTF (True Type) Font Formats

OTF is more likely to be a “better” font, as it supports more advanced typesetting features (smallcaps, alternates, ligatures and so on actually inside the font rather than in fiddly separate expert set fonts). It can also contain either spline (TTF-style) or Bezier (PostScript Type 1-style) curves, so hopefully you're getting the shapes the font was originally designed in and not a potentially-poorer-quality conversion.

On the other hand, if you're downloading free fonts from shovelware sites, you're unlikely to get any of that. Indeed, you may simple be getting a TTF font renamed to OTF.

IT Technology: Convert SSL Certificate from .PFX to .CRT


You may convert your SSL certificate from .pfx to .crt by following the steps below:
1. Install OpenSSL by going to https://slproweb.com/products/Win32OpenSSL.html
2. Copy the .pfx file you would like to convert in OpenSSL\Bin
3. Open command prompt and cd to the OpenSSL\Bin folder
4. Type in the following command to convert the certificate:
    openssl pkcs12 -in [yourfile.pfx] -clcerts -nokeys -out [certificate.crt]
5. Type in the import passphrase.
6. Done! The converted .crt file is located in OpenSSL\Bin

Wednesday 9 December 2015

Tuesday 8 December 2015

Apple: Unable to Power On Your iMac

<< Symptom >>
The iMac does not power on when you push the "power" button. Nothing happen! It looks like it is not connected to a power source (but it is).

<< Rule Out Display Issues >>
First, rule out the display as the source of the issue. To be sure you're not having a display issue, press your computer's power button. If your computer has power but doesn't have any video:
1. You may hear a startup chime.
2. You may hear fan or drive noise.
3. You may see a light from the Sleep LED (if your Mac has one).
4. Pressing the Caps Lock key on the keyboard causes it to light.

<< Solution >>
1. Verify that you have a good connection from your iMac to the wall outlet by confirming the power cord and adapter are securely connected and plugged in. To check if the wall outlet is working, plug in a lamp or other electrical device.
2. If the wall outlet is working and you continue to have no power, try another power cord or adapter if available. If it works, you might need a replacement cord or adapter.
3. Disconnect all accessories that are plugged in to your computer. This includes things like printers, USB hubs, or mobile devices.
4. Hold down the power button for ten seconds. Then, press the power button again to see if the computer turns on.
5. Reset SMC.
    a. Shut down the computer.
    b. Unplug the power cord.
    c. Wait fifteen seconds.
    d. Attach the power cord.
    e. Wait five seconds, then press the power button to turn on the computer.
6. Reconnect the memory.
    a. Shut down the computer.
    b. Unplug the power cord.
    c. Remove the memory.
    d. Install the memory again.

Thursday 3 December 2015

IT Security: System Explorer


System Explorer is a free, awards winning software for exploration and management of System Internals. This small software includes many useful tools which help you keep your system under control. With System Explorer, you get also fast access to file database which help you to determine unwanted processes or threats. System Explorer is translated into 29 languages and is available for download in installer and portable version.

<< Main Features >>
1. Detailed information about Tasks, Processes, Modules, Startups, IE Addons, Uninstallers, Windows, Services, Drivers, Connections and Opened Files.
2. Easy check of suspicious files via File Database or the VirusTotal service.
3. Easy monitoring of processes activities and System changes.
4. Usage graphs of important System resources.
5. Tray Hint with detailed System and Battery status.
6. WMI Browser and System Additional Info
7. Multilanguage Support

Palo Alto: Antivirus Feature - Prevent Sending SMTP Server from Resending Blocked Message


Palo Alto antivirus feature is able to block viruses via email by sending a SMTP response code of 541 to the sender. Response code 541 is a code with a description as “Recipient Address Rejected – Blacklist, Anti-Spam, Mailfilter/Firewall Block”.

By default, SMTP, POP3 and IMAP have the default action set to ALERT is because in most cases there is already a dedicated Antivirus gateway solution in place for these protocols. Specifically for POP3 and IMAP, it is not possible to clean files or properly terminate an infected file-transfer in-stream without affecting the entire session. This is due to shortcomings in these protocols to deal with this kind of situation.

If no dedicated Antivirus gateway solution is present for SMTP, it is possible to define a custom Antivirus profile and apply the reset-both action to infected attachments. In such case, a 541 response will be sent back to the sending SMTP server to prevent it from resending the blocked message.

Of course, the custom antivirus profile must be used in the appropriate security policy rules for the SMTP mail transfer.

IT Security: Testing Your Virus Protection with EICAR Test File


EICAR Standard Anti-Virus Test File (EICAR) is a safe file developed by the European Institute for Computer Anti-Virus Research (EICAR) for testing anitvirus software. It is commonly used to
1. Confirm that the antivirus software is installed correctly
2. Demonstrate what happens when a virus is found
3. Check internal procedures and reactions when a virus is found

Your antivirus software detects EICAR as if it were a real virus.

EICAR is a good way to get familiar with your antivirus software. The EICAR test file is available in the following four formats:
1. eicar.com: EICAR test file.
2. eicar.com.txt: Copy of eicar.com with a different file name.
3. eicar_com.zip: EICAR ZIP file for testing compressed files.
4. eicarcom2.zip: An archive which contains the eicar_com.zip file for testing nested compressed files.

To download the EICAR test files, visit the EICAR test file page.

Or you may make the test file by copying the following line into its own text file, and then name it EICAR.TXT:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

When done, you will have a 69-byte or 70-byte virus test file.

Microsoft: Windows Containers


Applications fuel innovation in the cloud and mobile era. Containers, and the ecosystem that is developing around them, will empower software developers to create the next generation of applications experiences.

<< What are Containers >>
They are an isolated, resource controlled, and portable operating environment.

Basically, a container is an isolated place where an application can run without affecting the rest of the system and without the system affecting the application. Containers are the next evolution in virtualization.

If you were inside a container, it would look very much like you were inside a freshly installed physical computer or a virtual machine. And, to Docker, a Windows Server Container can be managed in the same way as any other container.

<< Windows Containers >>
Windows Containers include two different container types, or runtimes.

Windows Server Containers – provide application isolation through process and namespace isolation technology. A Windows Server container shares a kernel with the container host and all containers running on the host.

Hyper-V Containers – expand on the isolation provided by Windows Server Containers by running each container in a highly optimized virtual machine. In this configuration the kernel of the container host is not shared with the Hyper-V Containers.

<< Container Fundamentals >>
When you begin working with containers you will notice many similarities between a container and a virtual machine. A container runs an operating system, has a file system and can be accessed over a network just as if it was a physical or virtual computer system. That said, the technology and concepts behind containers are very different from that of virtual machines.

The following key concepts will be helpful as you begin creating and working with Windows Containers.
Container Host: Physical or Virtual computer system configured with the Windows Container feature. The container host will run one or more Windows Containers.

Container Image: As modifications are made to a containers file system or registry, such as with software installation they are captured in a sandbox. In many cases you may want to capture this state such that new containers can be created that inherit these changes. That’s what an image is – once the container has stopped you can either discard that sandbox or you can convert it into a new container image. For example, let’s imagine that you have deployed a container from the Windows Server Core OS image. You then install MySQL into this container. Creating a new image from this container would act as a deployable version of the container. This image would only contain the changes made (MySQL), however would work as a layer on top of the Container OS Image.

Sandbox: Once a container has been started, all write actions such as file system modifications, registry modifications or software installations are captured in this ‘sandbox’ layer.

Container OS Image: Containers are deployed from images. The container OS image is the first layer in potentially many image layers that make up a container. This image provides the operating system environment. A Container OS Image is Immutable, it cannot be modified.

Container Repository: Each time a container image is created the container image and its dependencies are stored in a local repository. These images can be reused many times on the container host. The container images can also be stored in a public or private registry such as DockerHub so that they can be used across many different container host.

Container Management Technology: Windows Containers can be managed using both PowerShell and Docker. With either one of these tools you can create new containers, container images as well as manage the container lifecycle.

<< Containers for Developers >>
From a developer’s desktop to a testing machine to a set of production machines, a Docker image can be created that will deploy identically across any environment in seconds. This story has created a massive and growing ecosystem of applications packaged in Docker containers, with DockerHub, the public containerized-application registry that Docker maintains, currently publishing more than 180,000 applications in the public community repository.

When you containerize an app, only the app and the components needed to run the app are combined into an "image". Containers are then created from this image as you need them. You can also use an image as a baseline to create another image, making image creation even faster. Multiple containers can share the same image, which means containers start very quickly and use fewer resources. For example, you can use containers to spin up light-weight and portable app components – or ‘micro-services’ – for distributed apps and quickly scale each service separately.

Because the container has everything it needs to run your application, they are very portable and can run on any machine that is running Windows Server 2016. You can create and test containers locally, then deploy that same container image to your company's private cloud, public cloud or service provider. The natural agility of Containers supports modern app development patterns in large scale, virtualized and cloud environments.

With containers, developers can build an app in any language. These apps are completely portable and can run anywhere - laptop, desktop, server, private cloud, public cloud or service provider - without any code changes.

Containers helps developers build and ship higher-quality applications, faster.

<< Containers for IT Professionals >>
IT Professionals can use containers to provide standardized environments for their development, QA, and production teams. They no longer have to worry about complex installation and configuration steps. By using containers, systems administrators abstract away differences in OS installations and underlying infrastructure.

Containers help admins create an infrastructure that is simpler to update and maintain.

Wednesday 2 December 2015

Microsoft: Partitioning and Grooming Has Not Completed Recently in Microsoft System Center Operations Manager ( SCOM )


To solve this problem, you can execute grooming by opening SQL Management Studio, and opening a query window against the OpsDB – and running the grooming procedure “EXEC p_PartitioningAndGrooming”.