Archive | System Administration RSS feed for this section
Microsoft

Realizing the benefits of a Microsoft Premier support agreement

I do not normally get excited when talking about technical support but Microsoft Premier is different. The goal with having a Premier contract is that you will be more proactive, and try to locate and resolve issues before they become bigger problems. By purchasing this agreement you will also have access to an account manager […]

Leave a comment Continue Reading →
discover2015

A rapid-fire, action-packed week at HP Discover is just around the corner

This time next week, HP will be putting the final touches and opening the onsite registration lines for HP Discover.  Discover is HP’s annual trade show featuring the full breadth and depth of the HP product portfolio. This is also the final Discover before its separation into two companies, HP, Inc. and Hewlett Packard Enterprise, expected […]

Leave a comment Continue Reading →
Cloud Computing

With backups, it’s the restore that really counts

When is the last time your backups were tested?  For me, personally, it was a couple weeks ago.  My wife and I were sleeping beside our very sick child in the hospital (he’s great now, by the way).  My wife got up in the night to do something and her phone hit the floor – one […]

Leave a comment Continue Reading →
SSMC2-1

HP 3PAR SSMC 2.1 makes Peer Persistence configuration easy as 1-2-3

With the 2.1 release of the HP 3PAR StoreServ Management Console, HP has enabled the creation and control of Peer Persistence configurations within the management tool.  Peer Persistence is the HP branding for transparent LUN failover between storage arrays with no downtime – a concept VMware administrators will recognize is Metro Storage Clustering in the VMware vernacular. […]

Leave a comment Continue Reading →
Microsoft

Using PowerShell to compare a registry key before and after a change

So, while deploying IE 11, it became evident that something was happening in the IE settings that affected the display of certain webpages.  If we ran an IE Reset in the browser and set all the default settings, the sites would work fine, but after a while a policy or some change was occurring to […]

Leave a comment Continue Reading →
dl380g7

Installing Windows 2012 R2 on ProLiant DL380 G7 without SmartStart

Since HP SmartStart CD went the way of the dodo bird before Windows 2012 R2 was released, HP ProLiants older than a Gen8 require administrators to manually install Windows 2012 R2.  On ProLiant Gen8 and higher, you have Intelligent Provisioning – the replacement for SmartStart – embedded on the system, but this isn’t available on […]

2 Comments Continue Reading →
ExcellenceInIT

Great advice for building a successful IT career

If you’ve spent any time at all in the IT field, you know that there is a lot more than just being skilled with computers needed to be successful in the IT industry.  There’s a range of life skills needed that surround your technical competence that will help to make you successful.  Author Warren Zabloudil […]

Leave a comment Continue Reading →
B03636_3724EN_Cover_Feature

Introducing ‘PowerCLI Cookbook’, the step-by-step guide to adopting PowerCLI

If you’ve noticed that my blog posts have been a bit light over the last year, I am happy to finally tell why.  Last week, my first book published.  It was many months in the making, a lot of effort and it is now in the wild.  PowerCLI Cookbook is written to be a guide for beginners […]

Leave a comment Continue Reading →
vmware

Enabling Change Block Tracking (CBT) with PowerCLI Script

Change Block Tracking (CBT) is a technology in VMware used to record all the changed data within a VMDK file so that when backup software runs incremental backups, it knows exactly what has changed and can send only differences to the backup software.  This is a technology that greatly improves backup speed and efficiency by […]

Leave a comment Continue Reading →
Microsoft

Pass The Hash (No Really Don’t)

I attended TechEd 2014 back in May of this year and there was one session that I wanted to share called “TWC: Pass-the-Hash and Credential Theft Mitigation Architectures”. The part from the session that I wanted to focus on was regarding administrative privileges. Credential theft has become a serious problem in today’s world where everyone […]

Leave a comment Continue Reading →