Vol. 23, #22 - June 04, 2018 - Issue #1184

WServerNews: Book reviews


Transform IT with FlexPod converged infrastructure and Availability software.


FlexPod accelerates application deployments, speeds up a time to market, lowers costs and simplifies IT operational management. It is critically important for businesses adopting converged infrastructure systems to modernize their application Availability capabilities at the same time. By leveraging Availability software with FlexPod, companies can increase IT automation, mitigate risk and improve the return on their IT investments.

Learn how.

Editor's Corner

This week's newsletter has some reviews of some new titles on wireless networking and wireless sensor networks from CRC Press plus our usual assortment of tips, tools, links to articles, and some fun videos. BTW I'm a big fan of CRC Press as their books can be quite technical so reading them helps keep my brain from shriveling up from lack of use. Of course trying to read stuff that's TOO technical can result in your catching a nasty bout of brain overload as this Dilbert comic strip illustrates:


Ouch, I think I broke my brain.


Ask Our Readers! - Need help from the IT pro community?

WServerNews goes out each week to more than 500,000 subscribers worldwide! That's a lot of expertise to tap into. Do you need help with some issue or need advice on something IT-related? Got a question you'd like us to toss out to our readers to try and answer? Email us at [email protected]

Security and Data Reliability in Cooperative Wireless Networks (CRC Press)

In traditional wireless networking each client device communicates with the base station independently of all other client devices. The basic idea behind cooperative communication in wireless networking is for client devices to share their communications capabilities in various ways with the idea of improving the overall quality of all of the wireless links between the clients and the base station. For example, single-antenna devices could share their antennas cooperatively to create a distributed "virtual" antenna array with the result that overall communications are improved and power consumption is minimized. Emad Hassan's book explores the basic ideas behind cooperative communications in wireless networks and proposes relay and jammer selection schemes for improving security in both one- and two-way cooperative networks. The book also delves deeply into physical layer security in wireless networks and explains the different kinds of wireless sensor networks used for industrial control and monitoring, home automation, and other commercial and military uses. In this sense Emad's book is forward-looking and extends our understanding of how wireless network communications can evolve to ensure better performance and greater security. The book concludes with several appendices listing the MATLAB simulation codes used to model the results presented in several of chapters. The intended audience of this book is mainly engineers doing research in wireless networking so the level of mathematical background needed to follow some of the modelling is senior undergraduate and graduate level. You can buy this book on Amazon here:



Wireless Sensor Networks: Deployment Strategies for Outdoor Monitoring (CRC Press)

Wireless sensor networks (WSNs) differ from more traditional wireless networks where you have multiple clients communicating independently through one or more base station. With WSNs however there's little or no underlying infrastructure and you may have anywhere from a handful to thousands of sensor nodes working together to monitor some environment. These sensors then communicate through a wireless channel by making use of a gateway sensor node to the server or administrative workstation that processes their output. WSNs are typically tiny low-powered devices that use a wireless transceiver to communicate with one another to form a network. WSNs can either be deployed in an unstructured, ad hoc way or in a preplanned fashion to provide better coverage of the environment being monitored. Examples of what can be monitored by such sensor networks include physical parameters like humidity, pressure, temperature, mechanical stress, noise levels, and so on. Fadi Al-Turjman in his book provides some basic background information on WSNs and explores strategies for deployment and routing of sensor information through wireless networks. Grid-based and non-grid models are explored for deploying federated WSNs, and issues that may limit the usability and lifetime of WSNs in harsh outdoor environments are examined in detail using simulations. As our cities and workplaces transform through the deployment of Internet of Things (IoT) automation and monitoring, WSNs are similarly evolving from application-specific monitoring to large-scale multi-user applications that herald the emergence of "smart cities" where data both personal and public are gathered, analyzed, and used for monitoring and alerting purposes. There is some advanced-level maths in Fadi's book but not that much, and the basic ideas presented should be accessible to most IT professionals. You can buy this book on Amazon here:


Hierarchical Topology Control for Wireless Networks: Theory, Algorithms, and Simulation (CRC Press)

As mentioned above the smart cities of the future will depend heavily on wireless networking and wireless sensor networks (WSNs) to achieve their goals in automation, monitoring, and control. A key limiting factor in the operation of such networks is choosing the best topology that can ensure optimal performance while limiting energy usage and maximizing sensor lifetime. This book co-written by several Chinese researchers provides a good introduction to the subject of topology control and the various algorithms commonly used for creating the virtual backbone that connects WSNs together. I found the first chapter to be a very good introduction on how wireless networks have evolved, the various categories of wireless networks, the architecture of ad hoc wireless networks, and the technologies and uses of WSNs, so if you're new to the subject of WSNs the first chapter is well worth the price of the book. The mathematics gets heavier as the book progress into the topics of topology control in wireless networks, clustering routing protocols in ad-hoc wireless networks, and other subjects of more specialized interest to researchers and engineers working with WSNs and wireless networks. You can buy this book on Amazon here:



Send us your feedback

Got feedback about anything in this issue of WServerNews? Email us at [email protected]

Recommended for Learning

Cloud Simplified: A practical webcast to demystify Azure features

The focus of this series of episodes is to distill down complex topics into bite sized chunks to make it easy for you to quickly leverage these features to address similar requirements you may have for moving something into Azure:


Factoid of the Week - In search of perfect sound

Last week's factoid and questionwas this:

Lycos has finally discontinued its free Lycos Mail service as of June 1, 2018. Who still has fond memories of using Lycos?

So far no one has responded to this one, so either (a) everyone's too busy to answer, or (b) nobody used Lycos except me, or (c) whatever. So let's move on to this week's factoid:

Fact: Digital downloads of music are now being outsold by CDs and vinyl. 


Question: Vinyl? Who actually buys vinyl records nowadays? I know somebody must because there is a large vinyl record section at McNally-Robinson bookstore here in Winnipeg. See this news item from their website a couple of years ago:


But who actually buys vinyl records, and why? Can any of our readers enlighten us concerning this mystery?

Email your answer to us at [email protected]

Until next week, 

Mitch Tulloch


Admin Toolbox

Admin Tools We Think You Shouldn't Be Without

GOT ADMIN TOOLS or other software/hardware you'd like to recommend? Email us at [email protected]

Data Availability doesn't have to be difficult to deploy, cumbersome to manage, or expensive to purchase. Learn 7 Reasons not to renew Veritas NetBackup.


VeraCrypt is a free open source industrial strength encryption solution that makes encryption not only easy, but nearly un-crackable:


PHP Tools for Visual Studio transparently integrates into Microsoft Visual Studio, and extend it with the support for PHP language:


Sidder lets you quickly see which User Profile Disk belongs to which domain user:


This Week's Tips

PowerShell - Get version info for a file

Raymond Chen explains how to get file version information from the command line:



Azure - Manage and configure containers in Linux

Cloud Notes From My Desk lists all the commands you can use to manage Linux and Docker containers running in Azure:


Azure - Learn U-SQL

U-SQL is the big data query language and execution framework in the Azure Data Lake Analytics. Ajeta Singhal explains how you can get started learning this new language:



Events Calendar

Infosecurity Europe in London, England on June 5-9


Computex in Taipei, Taiwan on June 5-9


Cloud & DevOps World in London, England on June 12-14


OfficeCamp in Gelsenkirchen, Germany on June 18-20


HPE Discover in Las Vegas, Nevada on June 18-21


Microsoft Inspire in Las Vegas, Nevada on July 15-19


Microsoft Ignite 2018 on September 24-28, 2018 in Orlando, Florida USA


Add Your Event

PLANNING A CONFERENCE OR OTHER EVENT you'd like to tell our 100,000 subscribers about? Contact [email protected]

New on TechGenix.com

Fake Fortnite app tricks Android users into downloading malware

Android users downloading what they think is an official version of the hugely popular Fortnite are only getting a fake Fortnite app filled with malware.


Golden rules for managing your remote IT team effectively

The challenges of working with a remote IT team are well known, yet when problems arise they are often not handled quickly. Here's how to keep things running smoothly.


How AWS Fargate fits into Amazon's container offerings

AWS Fargate is the newest addition to Amazon's container offerings. I blurs the line between AWS ECS and AWS Lambda. Yet, where does it fit in a crowded container ecosystem?


New Microsoft Office 365 protection capabilities coming soon

Microsoft is rolling advanced Office 365 protection capabilities to subscribers of Office 365 Home and Office 365 Personal. Here's what's included in the new set of security capabilities.


Basic PowerShell commands for all Windows operating systems

About 90 percent of Windows operating systems operations can be managed using PowerShell. Here are some useful PowerShell commands to get you started.



Tech Briefing - Exchange Server

Modern public folders logging and when to use it

You Had Me At EHLO


Weekend Scripter: Exchange add-in module

Hey, Scripting Guy! Blog


[How-to] Block Cryptolocker at Exchange/Office 365

Branko Vucinec


Exchange 2016: URLs Configuration Script



Adjust Exchange 2016 Mailbox Move Historical Information




Other Articles of Interest

Management tools emerge from VMware-AWS partnership

VMware provides a series of tools, including Discovery, Cost Insight and Wavefront, to lighten the multi-cloud management burden for VMware Cloud on AWS customers.


Windows Server 2019 preview draws Azure closer

Windows Server 2019 will come with a number of enhancements to cater to administrators who want a tighter connection to the Azure cloud platform, Microsoft says. Access this article to learn about these enhancements.


Monoliths-to-microservices move refactors IT ops skills

As enterprises seek speed and efficiency with microservices, IT ops pros must learn skills and consolidate tools to deal with increased infrastructure and application complexity.


Are hyper-converged infrastructure appliances my only HCI option?

Access this article to read about the unique pros and cons of software-only and build-your-own hyper-converged infrastructure.



WServerNews FAVE Links

This Week's Links We Like. Tips, Hints And Fun Stuff

GOT FUN VIDEOS or other fun links to suggest you'd like to recommend? Email us at [email protected]


Shin Lim - World Champion of Close-Up Magic

Shin Lim, the World Champion of Close-Up Magic - gives a performance that is beyond anything you have ever seen before:


Two Cars Perform Balancing Act On A Huge Seesaw

This car see-saw stunt is awesome - one of the most difficult car stunt performance ever done with 4-wheel vehicles on a seesaw:


The Muppets - Bohemian Rhapsody

The Muppets' Musical Gang is back at it with their rendition of Queen's Bohemian Rhapsody:


13 Adorable Animal Thieves

From a picnic basket-robbing raccoon to a candy bar-stealing squirrel, these animal thieves are so cute we'll forgive them instantly:


Have any other readers found similar content they'd like to recommend for our Fave Links section? Email us at [email protected]


WServerNews - Product of the Week

Transform IT with FlexPod converged infrastructure and Availability software.


FlexPod accelerates application deployments, speeds up a time to market, lowers costs and simplifies IT operational management. It is critically important for businesses adopting converged infrastructure systems to modernize their application Availability capabilities at the same time. By leveraging Availability software with FlexPod, companies can increase IT automation, mitigate risk and improve the return on their IT investments.

Learn how.

WServerNews - Editors

Mitch Tulloch is Senior Editor of WServerNews and is a widely recognized expert on Windows administration, deployment and virtualization. Mitch was lead author of the bestselling Windows 7 Resource Kit and has been author or series editor for almost fifty books mostly published by Microsoft Press. Mitch is also a ten-time recipient of Microsoft's Most Valuable Professional (MVP) award for his  outstanding contributions in support of the global IT pro community. Mitch owns and runs an information technology content development business based in Winnipeg, Canada. For more information see www.mtit.com.

Ingrid Tulloch is Associate Editor of WServerNews and was co-author of the Microsoft Encyclopedia of Networking from Microsoft Press. Ingrid is also manages research and marketing for our content development business and has co-developed university-level courses in Information Security Management for a Masters of Business Administration program.