Vol. 23, #10 - March 12, 2018 - Issue #1172
All You Need to Know About Microsoft Windows Server 2016 Virtualization
Just stick to the rules and you'll be OK.
WServerNews now has over 400,000 subscribers worldwide! That's a lot of expertise to tap into. Do you need help with some issue or need advice on something IT-related? Got a question you'd like us to toss out to our readers to try and answer? Email us at email@example.com
Last week's newsletter included news about how Ubuntu Linux appears to be following in the footsteps of Windows 10 by collecting data about how users are using their systems. Microsoft has gotten a lot of bad publicity over this as it raises some serious privacy concerns in the minds of many users. A reader named Mark responded to this with the following comment:
All I can say is that it is better to listen, really listen, to what people want than to rely on software telemetry. One of Microsoft's bigger blunders was stating that the telemetry was the gold standard then having the UI team use that information as the reasoning for removing the Start Menu.
Yep, that was a classic example of poorly analyzed telemetry data over simply asking people what they think and listening to their responses. One of my fears about computing in general and the Windows platform in particular is that as more and more so-called artificial intelligence (AI) functionality is built into platforms, the result will be even worse instances of bad business decisions resulting from data-mining massive amounts of telemetry data. Do any readers share my fears in this regard? Email me at firstname.lastname@example.org
And now let's look at some new books that might interest you…
This excellent book which is now in its third updated edition is a helpful guide for businesses who are trying to adapt their corporate culture as regards IT to be able to keep up with our rapidly changing world. As I browsed through this book two chapters in particular struck me. Chapter 2 "The IT Dilemma" paints a picture of the problems today's organizations face concerning IT and asks some key questions that can help executives make strategically effective decisions on how they should evolve the role of IT within their organizations. The author Arthur Langer shares some helpful stories of case studies he performed that demonstrate how IT tends to be viewed from the top of an organization and shows that many organizations aren't operating with a clear strategic plan on how IT fits into developing and growing their business. The other chapter that particularly interested me was Chapter 7 "Virtual Teams and Outsourcing" as I've worked with several large companies on projects that have involved outsourcing key processes, not always with success. Langer offers a number of helpful insights into effective outsourcing management and how virtual teams can best function. Overall this is an excellent book that many IT managers can probably benefit from reading. You can buy it on Amazon here:
This book is a collection of technical papers and essays by various researchers on topics relating to the architecture, processing, and transmission capabilities of networks to handle big data. Some of the more technical papers are quite mathematically involved and will appeal mostly to researchers within their particular big data subfield. But even within these more technical papers there are usually explanations and insights that may appeal to any network architect who has to design, implement, or troubleshoot networks carrying huge amounts of data. For example, Chapter 5 is titled "Efficient Big Data Transfer Using Bandwidth Reservation Service in High-Performance Networks" and I turned to this chapter first since my background in Physics has made me especially interested in the fundamentals of how computer networks work. The authors of this particular chapter start by illustrating the problem of transmitting big data over networks by pointing out that the Large Hadron Collider (LHC) at CERN can generate up to 30 petabytes (!) of data per year. This brought back memories as I visited CERN back in 2000 when they were still building the LHC to write a magazine article about their computing infrastructure, and I remember spending an hour with a very stressed out network engineer as we tossed around ideas how he could build a switching infrastructure that could handle the enormous stream of data that was expected to pour out of the particle detectors once the LCH began operating. At the time it didn't seem possible to transmit huge amounts of data from CERN to its partner universities located in several places around the world. Of course much has changed since then--network transmission capabilities are many orders of magnitude greater now than they were almost 20 years ago. Big data is a complex subject however, and much of this book is devoted to mathematically modelling the various processes involved in analyzing and transmitting large amounts of data. For example, Chapter 17 "Toward Practical Anomaly Detection in Network Big Data" deals with identifying key performance indicators and using different models to identify transmission anomalies when they occur. The most promising models seem to be the sparse ones as machine learning simply can't process data fast enough to analyze massive streams of data. Anyways, this is a fascinating book that will probably appeal mostly to network engineers who are faced with effectively managing the transmission of big data. This doesn't mean however that it's limited only to academic or scientific environments like CERN, for big data is also becoming increasingly relevant in areas such as manufacturing, transportation, biomedical, and even online shopping. You can buy the book here on Amazon:
This book is also a collection of technical papers and essays by various researchers with the focus being mostly upon network architectures, technologies, and implementations. Once again many of the chapters are quite heavily focused on mathematical modelling and analysis. But the range of topics covered is quite large and includes cognitive radio, licensed shared access networks, 5G mobile networks, various heterogeneous networks, and the Internet of Things. I quickly browsed through several chapters and found these ones particularly interesting as they focused more on the basics. Chapter 19 "Big Data Computing Using Cloud-Based Technologies" provides an excellent summary of the different techniques used for processing, analyzing, and optimizing big data. The chapter also explains how cloud computing is an ideal match for big data and looks at various ways of deploying Hadoop in cloud environments. Chapter 21 "A Quick Perspective on the Current State of IoT Security" enlarged my understanding of this rapidly evolving field by summarizing the various IoT communication protocols currently in use or being proposed, including protocols associated with the security of IoT devices. And while Chapter 11 "A Fuzzy Logic-Based QoS Evaluation Method for Heterogeneous Networks" did pique my interest quite a bit (since I've always been interested in maths stuff like fuzzy logic) I quickly got bogged down with the formulas having been away from university for some years now. Books like this and the previous one however are good investments for IT departments of large organizations that push the envelope of computing and networking technologies, so it's worthwhile considering investing in buying a copy for your organization's technical library for the benefit of your network engineers. You can find the book on Amazon ehre:
Got feedback about anything in this issue of WServerNews? Email us at email@example.com
Office 365 CON 2018
Registration is now open for Office 365 CON 2018, the annual gathering of IT Strategists, Microsoft MVPs and Messaging Technology Vendors. This annual online event is presented by TechGenix and MsExchange.org, and this year's conference kicks off at 11am EDT on Thursday March 29, 2018 with a special Keynote Address by Michael Osterman, from Osterman Research, titled Filling the Functionality Gaps in MS Office 365. Be sure not to miss this informative keynote presentation! Register now!
Windows 10 Features for a Mobile Workforce
Would you like to learn more about Windows 10 features—especially for today's mobile workforce? Don't miss this helpful exploration, and get the details on everything from the basics to configuration. Plus, get links to more in-depth edX courses on these same topics. Start with a look at how to use Windows Configuration Designer to perform common provisioning tasks. See how to enable shared PC mode on a Windows 10 workgroup device, and then find out how to deploy apps using a provisioning package. Learn to use Windows Defender Security Center, configure Azure AD join, and see a demonstration on configuring Windows Update settings.
Last week's factoid and question was this:
In the movie Chain Reaction starring Keanu Reeves, Morgan Freeman, and Rachel Weisz, there's a scene in the first part of the movie where a scientist working at CERN, the largest particle physics accelerator in the world, looks at a computer screen and shouts "photons are moving!" What is your own worst movie moment when it comes to how science or technology is presented?
This one drew a response from Angelika our Content Coordinator here at TechGenix who with a sharp eye discerned the following scientific anomaly in one of my own favorite Bruce Willis movies:
Regarding your factoid from the last Factoid of the week, I love Bruce Willis and "Armageddon" (1998) with Aerosmith music, was one of the best movies I've ever seen but all explosions and fires… ugh, oxygen is needed to make something burn, and there is no oxygen there. After crashing on the asteroid, A.J. walks outside to check the wreckage -- and pieces are burning around.
Nice catch! Any more science-minded readers who have found similar flaws in movies they love? Email me at firstname.lastname@example.org
Now let's move on to this week's factoid:
Fact: Self-driving cars will leave 'THIRD of population JOBLESS' as AI sparks MASS UNEMPLOYMENT!!
Question: OK that's the downside, now what's the upside? ;-)
Email your answer to us at email@example.com
Until next week,
GOT ADMIN TOOLS or other software/hardware you'd like to recommend? Email us at firstname.lastname@example.org
NEW Veeam® Availability Orchestrator includes fully-prepared DR documentation to satisfy compliance requirements, automatically updated as the virtual environment changes.
Why partner with AppRiver? AppRiver is the go-to firm for channel partners who want the best Office 365 margins available, along with rock-solid security services backed by Phenomenal Care®.
EBF Onboarder can be used to execute migration projects from many sources to Microsoft Intune, Blackberry UEM and VMWare AirWatch:
Sysmon v7.0 Sysmon now logs file version information, and the option to dump the configuration schema adds the ability to dump an older schema or dump all historical schemas:
Microsoft Exchange Server User Monitor For Exchange 2013 and 2016 enables system administrators to view and evaluate individual users' usage and experience with Microsoft Exchange Server:
This guide from Microsoft may be helpful if your Active Directory environment ever experiences a forest-wide failure:
Damien Van Robaeys has a useful tip that shows you how you can view additional details concerning the progress of a Windows deployment being performed using MDT/SCCM:
Microsoft Tech Summit on March 14-15, 2018 in Paris, France
Microsoft Tech Summit on March 19-20, 2018 in San Francisco, California USA
Microsoft Tech Summit on March 28-29, 2018 in Amsterdam, Netherlands
Microsoft Ignite 2018 on September 24-28, 2018 in Orlando, Florida USA
PLANNING A CONFERENCE OR OTHER EVENT you'd like to tell our 100,000 subscribers about? Contact email@example.com
Tips for IT pros who work with small businesses
Tips are like peanuts - it never hurts to have a bag of them to munch on. Here are some tips that IT consultants for small businesses may want to
Repadmin tool: The handy, dandy fix for your Active Directory replication problems
Repadmin is a command-line tool from Microsoft that helps fix all replication problems in Active Directory. Here's how to use this tool.
Level up: What it takes to be hired as a senior IT professional
Getting hired for a senior IT position can be challenging. A top Certified Technical Trainer tells you how to navigate the challenges.
Considerations when upgrading Active Directory schema to Windows Server 2016
If you want to use Active Directory schema attributes that shipped with Windows Server 2016 but are running earlier Windows Server versions, you must upgrade your existing schema. Here's how.
PHP community taking stand against vulnerabilities
By today's coding standards, PHP is downright ancient, but it still has its supporters. The PHP community is pulling together to fix the language's well-known security problems.
Azure AD and Group-based authorization
Identity Sessions at Microsoft Ignite 2017
Remote Desktop Connection (RDP) - Certificate Warnings
Ask PFE Platforms
IT Pro Central
PS without BS: Building MDT and WSUS on Server Core
How to choose the best identity access management software
Many IAM products flood today's market, with a variety of different features. Read on to prioritize which capabilities are essential to the business before you make a final decision.
Citrix, VMware, thin clients, printing, DaaS, and Windows 10: Six things to watch in 2018
Predictions are overrated! Here are the expectations independent industry analyst, Gabe Knuth has of Citrix, VMware, thin client vendors, printing vendors, DaaS, and Windows 10 migrations as we begin 2018.
6 Enterprise mobility questions to ask in 2018 (And how to answer them)
Keep an eye on the following topics in 2018: Windows 10 Modern Management, mobile data breaches, Macs in the enterprise, the future of MDM, and more.
Apple vs. Google: Explore the top vendors who offer enterprise mobile devices
Compare Apple, Google, Lenovo and more. Check out their diverse offerings and decide which option is the best for your organization.
GOT FUN VIDEOS or other fun links to suggest you'd like to recommend? Email us at firstname.lastname@example.org
Throwing A Needle Through Glass In Super Slow Motion
Shaolin monks show off one of their most challenging skills - throwing a needle through glass - filmed in super slow motion (28,500 frames per second.)
Real Life Trick Shots - Part 2 - Dude Perfect
The guys from Dude Perfect, a Texas-based trick shot group, are back with another impressive round of trick shots involving household objects and everyday tasks:
In The Mood For Spring
This little squirrel is ready for the beginning of Spring:
People Are Awesome - Best of the Week 49
Awesome people doing gymnastics, snowboarding, rollerblading, bicycling, basketball, windsurfing, skiing, ice skating, archery, balancing, freerunning, and more:
All You Need to Know About Microsoft Windows Server 2016 Virtualization
Mitch Tulloch is Senior Editor of WServerNews and is a widely recognized expert on Windows administration, deployment and virtualization. Mitch was lead author of the bestselling Windows 7www.mtit.com.Resource Kit and has been author or series editor for almost fifty books mostly published by Microsoft Press. Mitch is also a ten-time recipient of Microsoft's Most Valuable Professional (MVP) award for his outstanding contributions in support of the global IT pro community. Mitch owns and runs an information technology content development business based in Winnipeg, Canada. For more information see
Ingrid Tulloch is Associate Editor of WServerNews and was co-author of the Microsoft Encyclopedia of Networking from Microsoft Press. Ingrid is also manages research and marketing for our content development business and has co-developed university-level courses in Information Security Management for a Masters of Business Administration program.