Quantcast
Channel: TechNet Blogs
Viewing all 17778 articles
Browse latest View live

Mobil eszközök kezelése Windows Intune integráción keresztül System Center 2012 Configuration Managerrel – VIII. rész

$
0
0

Console extensions

 

Az Intune által biztosított mobil eszköz kezelési képességek az Intune oldalon a következő hullámmal, ún. Wave-el frissülnek, bővülnek. Na de hogyan kerül át mindez a ConfigMgr-be?

On-premise oldalon a változást a ConfigMgr Console Extension-ök hozzák. Ezek néhány havonta megjelenő frissítések, amik az adott Intune Wave képességeit követik le és adják hozzá a ConfigMgr képességeihez.

Letöltésük automatikus; amint a ConfigMgr hierarchia legfelső szintjén lévő site hozzáfér egy új Extension-höz, letölti, és frissíti az adatbázist az Extension információval. Vigyázat - ez még nem jelenti azt, hogy aktiváltuk is az Extension-t!

Amikor egy új Extension elérhető lesz, a következő konzol indításkor az alábbi üzenet fogad majd minket:

ExtensionUpdate

Ahogyan a fenti üzenet is mutatja, az Extension telepítése közben a konzol nem elérhető.

A telepítés után az Extension információ replikálódik tovább a ConfigMgr hierarchia alsóbb szintjeire is.

Az elérhető Console Extension-ök az Administration –> Clud Services –> Extensions for Windows Intune részen érhetőek el, és itt tudjuk ezeket egyenként bekapcsolni.

 

Extensions2

Amikor egy Extension-t bekapcsolunk, először el kell fogadnunk a feltételeket:

License

Ezután lezajlik az Extension bekapcsolásának (vagy adott esetben a kikapcsolásának) folyamata:

ExtensionEnabled

UpdatingExtensions

UpdatingExtensions2 

A folyamatot az alábbi naplófájlokban követhetjük nyomon:

C:\Program Files (x86)\Microsoft Configuration Manager\AdminConsole\AdminUILog

FeatureExtensionInstaller.log

AdminUI.ExtensionInstaller.log

AdminUI.ExtensionInstaller.exe Information: 0 :  Successfully completed the process FeatureExtensionInstaller.exe install
AdminUI.ExtensionInstaller.exe Information: 0 :  Install succeeded for the extension. UniqueId: 76D991F7-B4ED-43C7-8B56-E75A63BB7D6B\100001137

 

Amennyiben kíváncsiak vagyunk rá, hogy a fenti Extension azonosító melyik Extension-t takarja, illetve a bekapcsolás folyamatát esetén a státuszt szeretnénk ellenőrzni, az alábbi SQL lekérdezés megmutatja a legfontosabb információkat:

select

L.Name,F.FeatureID,F.StateID,S.FeatureStateName,F.Flag,F.ErrorfromMDMCFDFeatureF

joinCFDLocalizedMetaDataL

onF.FeatureID=L.FeatureID

joinCFDFeatureStateS

onF.StateID=S.FeatureStateID

whereL.LocaleID=1033

 

 


International CES Mobile Apps Showdown Appreneur Awards—Open for submissions

$
0
0

Who Will Be the Next Global Appreneur Scholars?

You have the brains. You have the entrepreneurial spirit. And, you love mobile app technology. Enter now and find out if you have what it takes to be one of two global Appreneur Scholar award winners sponsored by the Kay Family Foundation. The deadline for submissions is October 20th – enter here at http://appreneurscholars.com/.

The international CES has pre-vetted 160,000 delegates, 6000 press, 3200 exhibitors and more than 2 million square feet.

Vowpal Wabbit for Fast Learning

$
0
0

This blog post is authored by John Langford, Principal Researcher at Microsoft Research, New York City.

Vowpal Wabbit is an open source machine learning (ML) system sponsored by Microsoft. VW is the essence of speed in machine learning, able to learn from terafeature datasets with ease. Via parallel learning, it can exceed the throughput of any single machine network interface when doing linear learning, a first amongst learning algorithms. 

The name has three references---the vorpal blade of Jabberwocky, the rabbit of Monty Python, and Elmer Fudd who hunted the wascally wabbit throughout my childhood.

VW sees use inside of Microsoft for ad relevance and other natural-language related tasks. Its external footprint is quite large with known applications across a broad spectrum of companies including Amazon, American Express, AOL, Baidu, eHarmony, Facebook, FTI Consulting, GraphLab, IBM, Twitter, Yahoo! and Yandex.

Why? Several tricks started with or are unique to VW:

  • VW supports online learning and optimization by default. Online learning is an old approach which is becoming much more common. Various alterations to standard stochastic gradient descent make the default rule more robust across many datasets, and progressive validation allows debugging learning applications in sub-linear time.

  • VW does Feature Hashing which allows learning from dramatically rawer representations, reducing the need to preprocess data, speeding execution, and sometimes even improving accuracy.

  • The conjunction of online learning and feature hashing imply the ability to learn from any amount of information via network streaming.  This makes the system a reliable baseline tool.

  • VW has also been parallelized to be the most scalable public ML algorithm, as measured by the quantity of data effectively learned from, more information here.

  • VW has a reduction stack which allows the basic core learning algorithm to address many advanced problem types such as cost-sensitive multiclass classification. Some of these advanced problem types, such as for interactive learning exist only in VW.

There is more, of course, but the above gives you the general idea – VW has several advanced designs and technologies which make it particularly compelling for some applications. 

In terms of deployment, VW runs as a library or a standalone daemon, but Microsoft Azure ML creates the possibility of cloud deployment. Imagine operationalizing a learned model for traffic from all over the world in seconds.  Azure ML presently exposes the feature hashing capability inside of VW via a module of the same name.

What of the future? We hunt the Wascally Wabbit. Technology-wise, I intend to use VW to experiment with other advanced ML ideas: 

Good answers to these questions can change the scope of future ML applications wadically.

John
Follow my personal blog here.

Microsoft “Trust Centers” provide integral information for Cloud-related decisions

$
0
0

By Adrienne Hall, General Manager, Trustworthy Computing

Customers tell us they’d like more information as to how we protect data, certifications that our services have obtained, and how we address security in the cloud. To address these questions, we’ve put together a number of resources on four Cloud Trust Centers.  See more >>

...(read more)

Announcing the availability of enabling Windows Server 2012 R2 Essentials’ integration of Microsoft online services in environments with multiple domain controllers

$
0
0

In Windows Server Essentials 2012 R2, all of our online services integration features, including Azure Active Directory and Office 365, are supported only in environments that have a single domain controller. In environments with more than one domain controller, integration of these services is blocked due limitations in the user account and password synchronization mechanism in Windows Server Essentials. 

I am happy to announce that with the recent Windows August Update released on (8/12/2014, PST), this limitation has been removed.  This update adds support for both Azure Active Directory integration and Office 365 integration features in domain environments consisting of a single domain controller, multiple domain controllers, or Windows Server Essentials as a domain member server.

For more information, please go to http://support.microsoft.com/kb/2974308.

IE increases protections, implements “out-of-date ActiveX control blocking”

$
0
0

Last week, Internet Explorer announced important changes it will be making to better protect customers from cybercriminal attacks.  Beginning on September 9, Internet Explorer will block out-of-date ActiveX controls, such as older versions of the Oracle Java Runtime Environment (JRE) as part of the August 2014 release of MS14-051 Cumulative Security Update for Internet Explorer (2976627).  ActiveX controls are small programs, sometimes called add-ons that are used by web sites to serve up content, like videos and games, and let you interact with content like toolbars.  While ActiveX controls have become increasingly popular over time, many of these applications are neglected or left unpatched for long periods of time potentially leaving people exposed and vulnerable to attack from cybercriminals.  This is because many ActiveX controls that exist today are not automatically updated.  Read more

...(read more)

Tell us your ‘Modern Business’ Stories!

$
0
0

Have you been helping your SMB customers to transform themselves in into a ‘modern business’ by moving onto the latest Microsoft products, services and devices? We want to hear all about it!

Every month we capture a range of customer success stories, as case studies or videos, which are featured on the Microsoft website and promoted through a range of online and offline marketing activities. With over 10,000 visits to our website case study page and 17m reach through social media activity last month, this is a great opportunity for exposure and PR.

What makes an ideal customer story?

We’re keen to hear about customers who are using a range of the latest version products, services and devices from Microsoft. This can include on-premise, hybrid and cloud environments but should include two or more products working together. The customer must be SMB sized, fully deployed and happy to talk about the business value they are experiencing. Perhaps how they have safeguarded their business, been able to grow more efficiently, enabled mobile and flexible working, or are using the technology to get better connected with their customers?

What value is there for you in participating?

When we capture the customer story, your involvement will also be included. So it’s a great opportunity to secure PR coverage for your own business and showcase your skills to potential customers.

How can you submit leads?

If you have one or more customers that you think would be a great lead for the programme, simply provide some initial details about them and the technology solution you have implemented to Juliet Strong at microsoftpartner@flashlightmarketing.co.uk - We’ll then get in touch to discuss it further.

We hope to hear about your customer success stories soon!

Success with Enterprise Mobility: App & Data Protection

$
0
0

STB_Banners_Components

A world-class enterprise mobility solution is a critical part of any organization’s IT strategy – period, end of sentence. When you look at what the enterprise mobility management solutions are built to do, they are built to protect the apps and data on those devices. The industry talks about Mobile Device Management, Mobile Application Management, Enterprise Mobility Management, etc. – and, no matter which acronym or segment is being discussed, the end-value ultimately comes down to protecting the corporate apps and data on a device. After all, supporting widespread device mobility isn’t very useful if everything on your devices is vulnerable.

The need for this kind of protection is a common topic of conversation with our enterprise customers since so much corporate data is cached on these devices – and we’re told over and over that the IT admins often have no control over the data (or where it goes next) once it’s on those devices. If you’ve seen this same lack of control in your own organization, I have good news.

In this post, I’ll examine something I touched upon earlier in this series in the Cloud-Device Convergence post: Multi-layered protection. I don’t know how to emphasize the value of this enough other than repeating it as often as I can; the layered protection that Microsoft is delivering in the Enterprise Mobility Suite is the only offering in the market that provides this comprehensive, multi-layered protection.

clip_image003There are four layers of security which you should insist on having within your enterprise mobility solution:

  • Layer 1: Protecting at the device (MDM in Intune).
  • Layer 2: Protecting at the app (MAM in Intune).
  • Layer 3: Protecting at the file (Azure RMS).
  • Layer 4: Protecting the identity and access (AAD Premium).

The other EMM vendors in the market are doing device and app protection, but they are completely missing file and identity protection.

Device Protection

The basic level of mobile device protection is for IT administrators to set policies that are applicable to the entire device. This is protection at the device level, and it is generally referred to as Mobile Device Management (MDM). For enterprise-grade device management, we have developed Intune to do the following:

  • Enable common policies like Password policies and device encryption policies for all devices.
  • ·Enable additional device restrictions like disabling Bluetooth, camera, or blocking document syncs to iCloud on an as-needed basis – all to strike a balance between security and user productivity.
  • Take advantage of native capabilities of the underlying mobile operating system. For example, the iOS platform has a feature called “Open in Manage.” We recommend configuring this setting to restrict data from a managed app (Work apps) data to be opened only in other MDM managed apps.

In Q4 of 2014 we will update Intune and introduce a new feature called “Conditional Access Policy.” This feature will allow the administrator to grant access to O365 (e-mail and OneDrive for Business) or on-prem Exchange onlyifthe device is managed by Intune and meets the compliance policy criteria specified by the IT administrator.

An example of this that I recently shared at Microsoft’s Worldwide Partner Conference (WPC) is conditional access to corporate e-mail. In this scenario, you can set a policy that a mobile device can only get corporate e-mail if the device has a power-on password, is encrypted, and is not jail broken. If any of these criteria are not met the flow of e-mail to the device stops and the user’s corporate inbox is emptied except for a single e-mail that informs the user that their device no longer meets the required corporate criteria. Helpfully, that single e-mail will instruct the user on how to bring their device back into compliance.

To see the device and app protection policies in action, skip ahead to the 21:00 minute mark in my WPC keynote.

I used e-mail as an example in that demo, but the conditional access capabilities we’re delivering in Intune can be applied to other Office apps like the One Drive for Business app that accesses O365 services.

App Protection

In addition to protecting at the device layer, most organizations are beginning to also provide protection at the app layer. This is usually referred to as Mobile Application Management (MAM). App protection enables organizations to apply security policies at the application layer, and this enables IT to protect the corporate apps and the corporate data being accessed and used in those apps (while leaving the user’s personal apps untouched).

Device protection is not a pre-requisite for app protection, but are often used together. For example, instead of requiring a PIN at the device level, an organization can choose to require a PIN only when the user launches an app that accesses corporate data. Our guidance is to protect at multiple layers and use both (plus the layers of protection I’ll detail below).

Application protection is usually done by either building the app with an SDK from an MAM vendor, or wrapping an existing app with the MAM vendor’s wrapper – either way the app is “invited” into a container that separates the corporate apps and data from the personal apps and data on the mobile device.

Over the coming months, we will be releasing both the SDK and app wrapper for Intune. Perhaps the most unique value that our SDK/wrapper offers – and which no other wrapper has – is that it empowers you to have your internal apps and the apps you are purchasing participate in the same container as the Microsoft Office apps running across Windows, iOS and Android. No other MDM/MAM solution will be able to manage the Office apps coming from Microsoft across the various platforms.

The Microsoft Office apps like Outlook, OneDrive, Word, PowerPoint, OneNote, etc. provide the best productivity experience for end users across all of the mobile OS platforms. The upcoming versions of the Office apps will ship natively instrumented to be managed by Intune’s app management policies.

Those app management policies include:

  1. Restricting data leakage:
    The following policy settings allow an IT administrator to control leakage of corporate data by restricting certain operations within the managed application:
    • Allow/Block Copy/Paste
    • Allow/Block Screen Capture
    • Allow/Block Print
    • Prevent file backup to unauthorized locations
    • Restrict sharing of data between applications, e.g. data can be shared only between Intune data protection control-enlightened applications
  1. Enforce corporate data access requirements:
    The following set of controls allow an IT administrator to require additional authentication when launching any application that access corporate data:
    • Require a PIN for launching the app, e.g. the administrator can specify the PIN complexity and caching duration
    • Require authentication using corporate credentials before launching the app
    • Require compliance to device policies for launching the app, e.g. For example, if the device is jailbroken, the application will not launch
    • Enforce encryption of app data at rest
  1. Application level selective wipe
    When a device is lost/stolen, IT administrator can initiate a selective wipe in such a manner that only the corporate data within the Intune managed apps are deleted and all personal data is left untouched.

In addition to the above application level policy controls, Intune will also ship with a set of apps like a Secure browser, PDF viewer, image viewer, etc.

To further prevent data leakage, and IT Admin can use these new features (for example) to specify that attachments or URLs in e-mail can be opened only using these secure browser or viewers. This ensures that the same restrictions (like blocking copy/paste) works on those secure applications.

File Protection

As I have mentioned several times before, the primary driver for an organization deploying an EMM solution is to protect the company data being accessedby and storedon mobile devices. The next layer of management you should be deploying is at the file level. To protect at the file level, you need something really special: Tools that embed the access privileges right in the file itself. In other words, the ability to make the file self-protecting.

To enable this level of file protection, we have developed Azure Rights Management Services (RMS). With Azure RMS, the File/Save action can grant access rights to the file and those rights can be written into the file itself. With these embedded access rights, even in the event that the file is accidentally sent to someone that shouldn’t have it (i.e. accidental data leakage), the person receiving that rogue file won’t be able to open it if you have not specifically named them in those embedded access rights. The file protects itself. Microsoft is unique in being able to provide this level of protection.

Azure RMS addresses the persistent and emerging security threats that all enterprises are grappling with – things like increasingly stringent regulatory policies (especially for sensitive medical data, or international business) and the continuing growth of BYOD and COIT. RMS-protected files can be sent to any devices or platform using Rights Management for Individuals, and we have already done the work to ensure the UX on these protected files is consistent.

Our goal (and I believe we’ve executed on it successfully) with RMS is straightforward:

  1. Support compatibility with virtually any file type
    Regardless of the type of file you have, it can be protected.
  2. Choose your own platform
    Regardless of the user’s device, a full-fledged RMS experience is available.
  3. Management flexibility
    Admins have total control over the type of security and policy.

Like all of our cloud-based products, one of the biggest benefits of RMS is that it is continually receiving updates to improve its security features and refine the UX. For a mobile workforce, these ongoing updates are a huge value add.

For those of you who love architecture as much as I do, here’s what RMS looks like on paper screen:

clip_image005

Whether your organization is already using cloud services (Office 365, for example, already supports RMS and includes exciting and powerful features such as Data Loss Prevention (DLP) functionality in Exchange and SharePoint), or if you’re considering doing so, there are a lot of ways for RMS to work for you. RMS features functionality from a fully cloud-based model, a hybrid model, or an on-prem model for organizations that simply cannot incorporate the cloud right now.

To evaluate and test RMS for yourself, I really recommend visiting the official RMS site, and you can stay up to date via the RMS blog.

Identity Protection

Identity protection/management is a massive topic, and it is one of the places where Microsoft really excels above and beyond anything else in the market (or on the horizon) from any of our competitors. This is the fourth layer of protection that we believe you should be actively implementing within your own organization.

Earlier in this series I wrote at length about Identity Management, and it is difficult to overstate just how valuable identity protection really is. The ability to govern the creation, publishing, and usage of SaaS apps (which can be used via single sign-on) is a major source of productivity, and this productivity is further extended due to the fact you can manage security from this same console (running in either Intune or SCCM).

We take identity protection so seriously that Azure AD (which is used for all the cloud-based authentication) is based on the rigorous Trustworthy Computing principals. In fact, our identity protection extends all the way down to passwords: Microsoft does not require you to store any user passwords in the cloud from the synchronized on-prem identities. Additionally, all access attempts are monitored and can be displayed via a simple set of reports that can track inconsistent access patterns (unknown source logins, multiple failed logins, logins from multiple geographies, etc.).

Reports like these put you in control and allow you to determine the best ways for your organization to manage access security, respond to potential threats, or make decisions about risk mitigation (like Multi-factor Authentication).

* * *

To see more about our protection solutions in action, check out this video from the Master of Mobility video series:

 


Microsoft Privacy Experts Marisa Rogers and Kristi Berry: Transparency and Other Data Best Practices

$
0
0

Understanding the complexities of customer data collection is vital for businesses today. Most businesses keep some kind of data on their customers—but knowing how to store it and how to communicate to customers about their data ensures your company remains secure and compliant.

...(read more)

Migrate Windows Server 2012R2 Virtualized Workloads to Microsoft Azure with Azure Site Recovery

$
0
0

Azure Site Recovery not only enables a low-cost, high-capability, CAPEX-saving, and OPEX-optimizing Disaster Recovery strategy for your IT Infrastructure, it can also help you quickly and easily spin-off additional development and testing environments or migrate on-premise virtual machines to Microsoft Azure. For customers who want a unified solution that reduces downtime of their production workloads during migration and that also enables verification of their applications in Azure without any impact to production, Azure Site Recovery with its in-built features makes migrating to Azure simple, reliable, and quick. The flowchart below describes a typical migration flow using Azure Site Recovery. For more information, please visit the following detailed blog on how to migrate on-premise virtualized workloads to Azure using Azure Site Recovery.

Flowchart describing workflow for migrating on-premise virtualized workloads to Azure using Azure Site Recovery.

Azure od A do… - Storage

$
0
0
V dnešním díle našeho seriálu se podíváme na věc zcela zásadní, a sice Storage. Místo kde všechna naše data jsou nebo budou ukládána. Kam s daty V Azure obstarává uložení dat takzvaný Storage Account. Díky němu můžeme zvolit „cestu“ kam naše data doputují. Storage Account má standardně název, který je současně i DNS...(read more)

New Antimalware Engine is planned for release on 18 Aug 2014

$
0
0

As part of the regular updating of our antimalware technology to address the latest in the threat landscape, MMPC is planning to release a new antimalware engine on the 18th of Aug 2014.

Affected products: Windows Defender, System Center Endpoint Protection, Microsoft Security Essentials, Forefront Client Security, Forefront Endpoint Protection, Windows Intune Endpoint Protection.

The Engine Version will be in the range of 1.1.1090X.0.

自動ホスト型アプリのプレビュー プログラムについてのお知らせ - パート 2

$
0
0

(この記事は 2014 年 8 月 8 日に Office Blogs に投稿された記事 Update on the Autohosted Apps Preview Program—part 2の翻訳です。最新情報については、翻訳元の記事をご参照ください。)

 2014 年 5 月 16 日に、Office 365 の自動ホスト型アプリのプレビュー プログラムに関するお知らせを掲載しました。マイクロソフトはこのプログラムを通して、SharePoint 用アプリのスムーズな展開エクスペリエンスを提供する最適な方法を模索していました。しかし、このプログラムは 2014 年 6 月 16 日に終了を迎え、現在 SharePoint で新たに自動ホスト型アプリを作成することはできなくなっています。Office 365 チームは Azure チームおよび Visual Studio チームと共同で、開発者の皆様からのご意見を取り入れ、アプリのホスティングについての概念を進化させて、よりシームレスなエクスペリエンスを開発者の皆様に提供することを目指しており、今回のプログラム終了は、この取り組みに基づいて決定されたものです。この記事では、新たな変更点と、これらの変更点が皆様に及ぼす影響についてご説明いたします。

自動ホスト型アプリを SharePoint Online にインストールできなくなったため、Office Developer Tools で自動ホスト型アプリを作成し、本番環境の SharePoint Online サイトに展開する機能は、2014 年 8 月 4 日にリリースされた Visual Studio 2013 更新プログラム 3 (英語)から削除されました。

現時点では、既存のアプリを停止または削除する予定はありません。Visual Studio でのサポートも継続されます。既存のアプリをサービスから削除する際には、自動ホスト型アプリから新しいプロバイダー向けのホスト型モデルに移行する時間をとっていただけるように、前もって更新記事を掲載いたしますので、ご安心ください。

現在、本番環境でプレビュー プログラムの自動ホスト型アプリを使用している場合は、プレビューの自動ホスト型アプリを、日々改良が加えられている新しいプロバイダー向けのホスト型アプリに移行する方法が MSDN の記事で説明されていますので、こちらの手順に従って移行することをお勧めします。アプリからのデータのプルのみを実行したい場合は、関連する Office のサポート窓口 (英語)にお問い合わせください。

マイクロソフトはプロバイダー向けホスト型アプリ モデルの可能性に期待しており、この新機能が開発者の皆様のニーズに、より高度なレベルで対応できるよう、必要となる各種コンポーネントの開発に積極的に取り組んでいます。このモデルでは、展開および管理の合理化、Azure の全機能へのアクセス、アプリのスケーリングの簡素化など、皆様からご要望いただいていた機能を提供する予定です。

いつものお願いではありますが、マイクロソフトでは、皆様のご意見、ご感想をお待ちしています。ぜひ、UserVoice のサイト (英語)にお寄せください。

よく寄せられる質問

自動ホスト型アプリのプレビュープログラムを終了する理由を教えてください。

自動ホスト型アプリは、SharePoint 用アプリを作成するためのシームレスな展開エクスペリエンスを提供する方法を模索することを目的としたプレビュー プログラムでした。マイクロソフトは、この機能を改良して開発者と一般ユーザーの両方に最高級のエクスペリエンスを提供するために必要となる、貴重なフィードバックを十分に集めることができました。

サービスで実行中の自動ホスト型アプリのプレビュープログラムはいつ終了するのですか。

具体的な日付については後日お伝えします。少なくとも 2014 年末までは、サービスで実行中のアプリを停止する予定はありません。

自動ホスト型アプリはいつから本番環境で使用できるようになりますか。

現在、Azure チームおよび Visual Studio チームと協力し、同種のスムーズなホスティング モデルの後継の開発に全力で取り組んでおり、2014 年末までに発表する予定です。今後の更新情報については Office ブログ (英語)にてお知らせいたします。

 

PowerShell Mini-Scripting Games 2014: Problem 4

$
0
0

Summary: Here is Problem 4 in Windows PowerShell Mini-Scripting Games 2014.

Microsoft Scripting Guy, Ed Wilson, is here. Today we have problem four in the Windows PowerShell Mini-Scripting Games. Remember: Please do not post any answers to these problems until next week. Please do not spoil the fun for your fellow scripters!

Problem 4 description

Your manager tasked you with what he considers to be a really important issue. The people at the Help Desk want a tool that will permit them to easily stop processes. Your manager doesn’t want to give them permission to use Task Manager because it carries too much power.

He decided that he wants you to write a script that will permit people who run the script to kill any process that they have user rights to stop. Your manager does not want people to be able to stop any process, only those for which they have user rights.

Task

Create a graphical interface that lists processes. Permit users to select a process from the list and stop that process.

Hint: Do not do any more work on this project than you need to accomplish the task.

Mini-Scripting Games Week will continue tomorrow when I will unveil the last question (PowerTip) and problem.

I invite you to follow me on Twitter and Facebook. If you have any questions, send email to me at scripter@microsoft.com, or post your questions on the Official Scripting Guys Forum. See you tomorrow. Until then, peace.

Ed Wilson, Microsoft Scripting Guy 

Единицы назначения, пиковая загрузка, пиковые единицы и формула планирования

$
0
0

В предыдущих версиях Project могла возникнуть ситуация, когда изначальное значение единиц назначения ресурса изменялось, что приводило к неожиданным результатам в отношении формулы планирования. Это поведение изменилось в версии Project 2010. Теперь она отслеживает и значение единиц назначения, и вычисляемое значение, называемое пиковой загрузкой.

...(read more)

Step-By-Step: enable Multi-Factor Authentication in Azure

$
0
0
Hello Folks, lately I’ve been covering Azure and active directory pretty often. It’s because I believe that it’s crucial for us IT Pros to learn as much as we can about the cloud and the value it can bring our enterprises. In this next post we will do a simple setup of Multi-Factor Authentication (MFA) using a call back scheme to validate the user’s identity. but I do recommend the following MVA modules as primer for any Azure conversation. Automating the Cloud with Azure Automation Moving to Hybrid...(read more)

Window display issue after detaching extended screens

$
0
0

Hey folks, we recently had a bug come through to us via Connect informing us of a Positional Memory Issue in Service Manager. The issue was originally reported by one of our customers and impacts all 2012 versions of Service Manager.

image

Josh Perez and Jeffrey Fanjoy from our support team, being the awesome SM detectives they are, did some investigation on the issue and here’s what they relayed to us.

Scenario:

Customer has SCSM 2012 installed on a laptop. He connects his laptop to a 2nd display, the console memorizes the way the display exists and defaults its screens to open on the new extended display.

Customer now detaches his second screen, shuts down, and goes about his business.

Problem:

The next time the customer runs SCSM on this laptop, the console will continue to try to open the Activities Form Window in the extended display that no longer exists.

Details:

Service Manger keeps the Windows’ locations in registry, but when restoring it does not take into account the possibility that the Windows’ locations may no longer be valid. Additionally, the registry keys specifically for the Activity’s form position does not reset upon detaching the extended display causing certain forms to not show.

Workaround:

The registry keys in question here reside under HKEY_CURRENT_USER\Software\Microsoft\System Center\2010\Service Manager\Console. If you run into this issue, you can reset the window location by following these steps:

 

  1. Close the SM console.
  2. Delete the registry key HKEY_CURRENT_USER\Software\Microsoft\System Center\2010\Service Manager\Console. Note: As always, when working with windows registry keys, it is important to take a backup by exporting it. Keep in mind that doing so will reset all console settings.
  3. Restart the console - the deleted information will be recreated once you do so.

The forms should now render on the primary connected display.

clip_image002

 

BTW, we’re lining up this bug for investigation in one of the coming URs. In the meanwhile, this workaround should help keep things moving along :)

User Productivity with Cortana

$
0
0

With the release of Windows Phone 8.1 we also introduced Cortana - the world’s first truly personal digital assistant.

As most of the others who are testing right now Windows Phone 8.1 Developer Preview, I also started first asking her funny questions like “Cortana what is the meaning of life” or “Cortana tell me a joke” but shortly after I really wanted to challenge Cortana and see how she can help me to improve my day to day productivity.

Alarms:

You are about to fall asleep but you still need to pick up your phone, unlock it and setup an alarm for tomorrow morning. Don’t worry Master Chief. Cortana is now there and you can just ask herto setup an alarm and she will take care of it.

Time to Drive:

One of the coolest things i have noticed while working with Cortana is how I get a notification in the morning visualizing the road between my apartment and the office. what really impressed me is the advise cortana gave me on when should I leave to be there on time

Calendar:

I got very often a pretty full meeting agenda. Follow-Ups, Sync-Up calls, bi-weekly meetings and so on. Now rather than me checking out each of my meetings one by one I can just ask Cortana about my upcoming schedule. Cortana even understands when you ask to schedule, reschedule or cancel meeting requests.

Reminders:

Have you ever been in a situation where you really needed to be sure that you don’t forget something when going from one office to the other? Or even when you were about to hit home after a very long day? Forget about writing notebooks or into any specific app. Cortana can do that now for you. Just tell her that she should remind you to do a certain task. It even understands requests like “Remind me when I’m near XYZ to buy XYZ”.

Lync:

The Lync 2013 App for Windows Phone and Cortana are already very good friends. Cortana can process commands like “Lync join current meeting”, “Lync show current meeting” and even “Lync play voice mail”. This in particular reduces for me the time I need in order to open the App myself and click or swipe through the different areas of it.

Places:

After a tough day at work and loads of meetings what is better than finding the closest barista? Well Cortana knows exactly not only where the barista is hiding, but also can give me directions on how to get there.

Overall:

Cortana is in fact a real personal digital assistant and helps me with my everyday tasks. The above mentioned capabilities are really just a small subset of what Cortana is capable of. You can clearly see from the way Cortana interacts with the Windows Phone user that it is powered by Bing.

PROJECT 2010 & PROJECT SERVER 2010. ACTUALIZACION ACUMULATIVA AGOSTO 2014.

$
0
0

Buenas,

Se ha liberado la actualización acumulativa de Project 2010 correspondiente a Agosto de 2014. Este mes no tenemos una para Project Server 2010. Podemos leer más información al respecto en este post de Brian:

http://blogs.technet.com/b/projectsupport/archive/2014/08/13/microsoft-project-server-2010-and-2013-august-2014-cu-announcement.aspx

Si estuviéramos interesados en obtener más información acerca de las correspondientes a SharePoint 2010, podemos localizarlas en este artículo:

http://support.microsoft.com/kb/2987238

Paquete cliente Project:

Descripción del paquete de actualización de Project 2010 (project-x-none.msp): 12 de Agosto de 2014

http://support.microsoft.com/kb/2883021/es

Como bien indica Brian en su blog, la versión del cliente es la 14.0.7130.5000, por si quisiéramos limitar qué clientes se conectan a nuestro sitio PWA.

Esperamos os resulte de interés, un saludo

Jorge Puig

Was ist neu im Windows Phone 8.1 GDR1 Update

$
0
0

Ich habe eine kleine Zusammenfassung über die im DGR1 Update enthaltenden Features von Windows Phone 8.1 zusammengestellt.
Das GDR1 wird im Moment auf den Windows Phone 8.x Geräten ausgerollt. Nokia hat hier eine Übersicht über die Verfügbarkeit dieser Updates zusammengefasst.

  • Unterstützung von interaktiven Covern.
    Bei interaktiven Covern handelt es sich um Cover die an das Gerät angebracht werden und dank verschiedener Muster oder Aussparungen bestimmte Informationen durchlassen. Interaktiv wird das Cover aber erst durch die passende App, die mit GDR1 auch unterstützt wird. So kann das Display z.B. genau in dem Displaybereich die Uhrzeit oder andere Informationen anzeigen in dem eine Aussparung im Cover ist.
  • Einführung von Ordnern auf dem Startscreen.
    Dazu einfach eine Tile lange gedrückt halten und über eine andere ziehen, schon habt ihr einen Ordner angelegt. Weitere Tiles können dann selbstverständlich in den Ordner geschoben werden. Beim auswählen des Ordners poppt dieser auf und man kann die gewünschte App starten. Zum Löschen einer Tile aus dem Ordner einfach die Tile im Ordner gedrückt halten und aus den Ordner ziehen.
  • 7 Zoll Phablets.
    Microsoft will den OEMs die Möglichkeit eröffnen auch Phablets mit 7" Displaydiagonale herzustellen. Passend dazu liefert Microsoft auch gleich die neue Auflösung.
  • Unterstützung der WXGA Auflösung.
    1280 x 800 Pixel
  • Unterstützung der qHD Auflösung.
    960 x 540 Pixel
  • Einführung des NTP (Network Time Protocol).
    Damit wird sich die Uhr von Windows Phone automatisch über einen NTP Server richtig einstellen.
  • Mittlere Größe der Marketplace Tile ist eine Live Tile.
    Wie schon bei Windows 8.1, jetzt auch bei Windows Phone.
  • Voice over LTE (VoLTE).
    Damit ist es möglich das Telefonat über LTE zu führen. Dadurch fallen keine "Telefonkosten" im eigentlichen Sinne sondern nur die Datenkosten an.
  • Adressbucheintrag für Cortana.
    Dieser ermöglicht dem Navigationssystem des Autos mit Cortana zu kommunizieren. Cortana ist jedoch in Deutschland noch nicht verfügbar.
  • Nutzung der SD-Karte für System Updates.
    Der Hersteller kann auswählen ob die SD-Karte zur Nutzung von Updates des Betriebssystems genutzt werden soll oder nicht.
  • Systempartition soll komprimiert werden können.
    Dadurch hat der Nutzer mehr Speicher für persönliche Dateien und Apps zur Verfügung. Dieser Punkt sollte vor allem für alle zukünftigen Lumia 530 Nutzer interessant sein, ist der interne Speicher mit 4GB doch eher knapp bemessen.
  • Sichtbarkeit des "Automatisch nach Updates suchen" Menüpunktes.
    Der Hersteller kann entscheiden ob der genannte Punkt sichtbar oder unsichtbar für den Nutzer sein soll.
  • Näherungssensor für Zukünftige Geräte vorgeschrieben.
    Alle zukünftigen Geräte müssen den Näherungssensor verbaut haben.
  • Unterstützung des aptX Codec und AVRCP (Audio/Video Remote Control Profile).
    Durch die Unterstützung des aptX Codec wird der Genuss von Musik und Video über Bluetooth qualitativ erhöht. Das neue AVRC Profil ermöglicht einen gesteigerten Komfort beim Fernzugriff auf das Gerät.
  • App-Ecke
    Die neue App-Ecke erlaubt die Darstellung von ausgewählten Anwendungen im "Sandbox-Modus", wodurch die Nutzung von Apps auf dem Smartphone gezielt eingeschränkt werden kann. Damit ist die App-Ecke vor allem für kleinere Unternehmen interessant, die keine vollständige Mobile-Device-Management (MDM) Lösung benötigen, den Einsatz von Geräten für Mitarbeiter aber trotzdem gezielt einschränken möchten.
  • Neue USB-Sicherheitsfunktion
    Dank einer neuen Sicherheitsfunktion ist es nach dem Update möglich das Telefon an einen USB-Port anzuschließen und “nur” zu laden. Es können keine Daten ausgetauscht werden. Somit kann z.B. keine Schadsoftware an Ladestationen oder fremden PCs auf das Telefon übertragen werden. Die Funktion kann je nach Bedarf in den Einstellungen an- oder abgeschaltet werden.

Viewing all 17778 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>