(Slowly) 39 Readers: Vista Not Worth It—Yet 21

Total Page:16

File Type:pdf, Size:1020Kb

(Slowly) 39 Readers: Vista Not Worth It—Yet 21 0207red_Cover.v5 1/17/07 11:32 AM Page 1 Web 2.0 Players Take the Battle to Microsoft 43 FEBRUARY 2007 REDMONDMAG.COM VivaViva Vista?Vista? Are Vista’s Gains Worth the Pain? 32 Vista 3-D Apps Are Coming (Slowly) 39 Readers: Vista Not Worth It—Yet 21 > $5.95 02 • FEBRUARY ++Ethical Hackers: A Fact of IT Life 51 25274 867 27 Google Ratchets Up Its Desktop Plans 11 71 Project2 1/9/07 11:37 AM Page 1 Project2 1/9/07 11:38 AM Page 1 FullArmorAdvertorialFinal.qxd 1/17/07 8:48 AM Page 1 ADVERTISEMENT Workplace Trends in the 21st Century Today, organizations rely heavily on computing technologies to manage their business workload. But with the rising cost of business, the increasing globalization of all business processes and the continuing need to remain competitive, businesses of all sizes have begun to change the way they work. One of the most significant of these changes is the move to telework—the ability to work from remote locations that are not necessarily under corporate control. In a report released in 2005, International Telework Advisory Council (ITAC) found that out of 135.4 million American workers, more than 33 percent were working from home. Of these, ITAC estimated that about 26.1 million do it at least one day per month and some 22.2 million at least once a week. Today, teleworking is continuing on an upward trend with more and more organizations supporting it. The Power and Limitations of Active Directory • Offshore outsourcing teams which have their own network but Another major trend is the use of Microsoft Active Directory (AD) must connect to yours for extended periods of time. and its corresponding Group Policy Objects (GPOs) to manage • Teleworkers, which may include users working from home on connected endpoints. With its extensive settings and controls, either corporate or personal equipment or employees working Group Policy provides an extremely powerful engine for the man- from public computer systems. agement of every aspect of a system’s configuration from compli- ance to security baselines. Each of these situations can lead to systems that are non-com- Group Policy is not the be all and end all of object management pliant because they do not have appropriate corporate settings. in Windows. That’s because GPOs are only effective with connected systems or systems that are part of a specific network and are The Arrival of Windows Vista members of a specific Active Directory structure. Disconnected sys- Group Policy remains very powerful and, with the coming of tems usually fall out of the scope of AD management. Disconnected Windows Vista, will boast more than 800 new settings, bringing the systems range far and wide (see Figure 1) and can include: total number of settings to 2,450. What’s more, Vista will also • Systems that are part of a connected network, but are subject change the way Group Policy is processed, using a new, independ- to GPO mismatches. ent processing engine that is now separate from the login system. • Systems that belong to road warriors or employees that spend This should help alleviate some of the problems previous editions of long periods out of the office. Windows had with Group Policy. • Branch offices or offices that are connected to the directory Organizations won’t move to Vista overnight, but one thing that through slow links. all public sources tend to agree on is the manner in which organiza- • Guest logins or logins to the internal network from systems tions will migrate. There are two: forklift or attrition. The first that are not members of the AD structure. involves a massive project that migrates all systems at once. The FullArmorAdvertorialFinal.qxd 1/17/07 8:48 AM Page 2 second relies on regular hardware refreshes to migrate systems as of this type of solution is the endpoint policy management products new hardware is introduced into the network. Hardware refreshes from FullArmor Corporation. These tools let you extend your exist- are usually performed on a three- or four-year cycle. This means ing policies and consistently apply them to both connected and that organizations choosing this method will need to manage mixed disconnected endpoints. In addition, they provide support for the client environments for at least two to three years. management of mixed Vista and non-Vista environments by sup- This can be significant, especially in light of the changes porting by-directional ADM to ADMX conversions. Microsoft has introduced to Group Policy in Windows Vista. Prior to Part two of this series will address how these solutions can help Windows Vista, all GPO definition templates used an ADM file your organization maintain a fully compliant state in any connected format—pure text files that were organized in a structured manner. or disconnected situation. If you’re interested in solving the discon- With Vista, Microsoft is introducing the ADMX format—a format nected management challenge, then don’t miss this second part. based on the Extended Markup Language (XML) which provides much richer content for GPO templates. ADMX templates are now language-independent, globalizing Group Policy settings. The ADMX format is incompatible with the ADM format, meaning that environments managing a mix of Windows 2000 and/or XP with Vista will need to either translate their existing templates to ADMX format or create new ones. They will also need to carefully manage mixed GPO content to make sure they do not cause more problems that they solve. Solving Disconnected Management Problems Whether you’re working with Vista or not, you need to make sure your systems and the systems that connect to your network are compliant at all times. There are several potential solutions to the issues disconnected systems present when it comes to compliance control. • First, you should try to leverage the investments you make Figure 1. Potential Disconnected Systems in Group Policy. Group Policy is very powerful, but designing a complete com- Resources: pliance strategy based on GPOs can be challenging and time- ITCA Survey: www.workingfromanywhere.org/news/pr100405.htm. consuming, especially if you do it from the ground up. One of the best ways to do this is to document each GPO. But, as Best practices information on how to design an Active Directory for you may know, tools such as the GP Editor in Windows or the object management: www.reso-net.com/Documents/ Group Policy Management Console (GPMC) do not offer the 007222343X_ch03.pdf. ability to document the content of a GPO, though the GPMC at least will report on the settings it includes. Most organiza- How to minimize the number of GPOs in your network while provid- tions have opted for the use of other tools—for example, ing compete management services: Download “Redesigning GPO Microsoft Excel spreadsheets—to document the purpose and Structure for Improved Manageability” at www.reso-net.com/ content of each GPO they produce. download.asp?Fichier=P73. • Second, you can rely on local Group Policy to control disconnected clients. Microsoft licensed an ADM to ADMX conversion tool from Local GPOs give you a lot more control over computers that FullArmor Corporation: This free utility is available at may or may not be connected to an AD structure. And while www.fullarmor.com/ADMX-download-options.htm. previous versions of Windows only included a single local Group Policy, Windows Vista has the ability to include more than one Information on endpoint policy management products: local GPO on each computer system. It applies these local www.fullarmor.com. GPOs in layers. As in previous versions of Windows, the first layer applies it to the computer system. The second applies it to ABOUT THE AUTHORS a local group, either the Administrators or a Users group. The Danielle Ruest and Nelson Ruest are IT professionals specializing third can apply a local policy to specific local user accounts. in systems administration, migration planning, software manage- • Third, you can rely on third-party solutions to manage ment and architecture design. They are authors of multiple books policies at all times. and are currently working on the Definitive Guide to Vista The best solution is to fully rely on your AD and Group Policy Migration (www.realtime-nexus.com/dgvm.htm) for Realtime investments but leverage them on all possible computer systems Publishers as well as the Complete Reference to Windows that interact with your network. For this, you’ll need third-party Server Codenamed “Longhorn” for McGraw-Hill Osborne. They solutions—solutions that can extend the power of Group Policy to have extensive experience in systems management and operating support all of the disconnected scenarios. One excellent example system migration projects. For a more in-depth overview of the new workplace trends, read the white paper at http://redmondmag.com/techlibrary/fullarmor 1.800.653.1783 Project1 1/3/07 10:06 AM Page 1 Uncontrolled use of USB sticks, MP3 players and PDAs opens up your network to data theft and viruses Control user access to all devices connected to your network with GFI EndPointSecurity You have invested in network anti-virus software, firewalls, email and web content security to protect against external threats. Yet any user can come into the office, plug in a USB stick and take in/out over 32 GB of data. Users can take confidential data or they can unknowingly introduce viruses, trojans, illegal software and more actions that can affect your network and company severely. Yet, as an administrator you had no way to control this until now! GFI EndPointSecurity allows administrators to centrally manage user access to devices such as iPods, USB sticks, PDAs, laptops and more.
Recommended publications
  • Windows 7 Operating Guide
    Welcome to Windows 7 1 1 You told us what you wanted. We listened. This Windows® 7 Product Guide highlights the new and improved features that will help deliver the one thing you said you wanted the most: Your PC, simplified. 3 3 Contents INTRODUCTION TO WINDOWS 7 6 DESIGNING WINDOWS 7 8 Market Trends that Inspired Windows 7 9 WINDOWS 7 EDITIONS 10 Windows 7 Starter 11 Windows 7 Home Basic 11 Windows 7 Home Premium 12 Windows 7 Professional 12 Windows 7 Enterprise / Windows 7 Ultimate 13 Windows Anytime Upgrade 14 Microsoft Desktop Optimization Pack 14 Windows 7 Editions Comparison 15 GETTING STARTED WITH WINDOWS 7 16 Upgrading a PC to Windows 7 16 WHAT’S NEW IN WINDOWS 7 20 Top Features for You 20 Top Features for IT Professionals 22 Application and Device Compatibility 23 WINDOWS 7 FOR YOU 24 WINDOWS 7 FOR YOU: SIMPLIFIES EVERYDAY TASKS 28 Simple to Navigate 28 Easier to Find Things 35 Easy to Browse the Web 38 Easy to Connect PCs and Manage Devices 41 Easy to Communicate and Share 47 WINDOWS 7 FOR YOU: WORKS THE WAY YOU WANT 50 Speed, Reliability, and Responsiveness 50 More Secure 55 Compatible with You 62 Better Troubleshooting and Problem Solving 66 WINDOWS 7 FOR YOU: MAKES NEW THINGS POSSIBLE 70 Media the Way You Want It 70 Work Anywhere 81 New Ways to Engage 84 INTRODUCTION TO WINDOWS 7 6 WINDOWS 7 FOR IT PROFESSIONALS 88 DESIGNING WINDOWS 7 8 WINDOWS 7 FOR IT PROFESSIONALS: Market Trends that Inspired Windows 7 9 MAKE PEOPLE PRODUCTIVE ANYWHERE 92 WINDOWS 7 EDITIONS 10 Remove Barriers to Information 92 Windows 7 Starter 11 Access
    [Show full text]
  • Sansymphony-V Memory Considerations
    Lenovo Storage DX8200D Updating the Deployment Image (WIM) File First Edition (March 2017) © Copyright Lenovo 2017. LIMITED AND RESTRICTED RIGHTS NOTICE: If data or software is delivered pursuant to a General Services Administration “GSA” contract, use, reproduction, or disclosure is subject to restrictions set forth in Contract No. GS-35F-05925. Table of contents Document Revision History 3 Recent changes made to this document 3 Modifying the Image File 4 Stage One – Creating the Intermediate Image 4 Stage Two – Creating the Release Image 5 Modifying ADK Content 7 Updating the Hardware Definition File 7 Updating the Product Documentation 7 Document Revision History Recent changes made to this document First published (January 2017) – Release V1.0 Page | 3 Lenovo DX8200D Updating the Deployment Image Modifying the Image File Overview Since the deployment image file is a Microsoft Windows Imaging Format file (‘.wim file’), it can be manipulated as with any other such file by making use of the utilities made available by Microsoft for this purpose. The utility required in this case is the Deployment Image Service Image and Management tool, or “DISM”. The predecessor to DISM, the ImageX tool, has been deprecated since Windows 8 and cannot be used to manage image files for the DX8200D family of appliances. DISM is distributed by Microsoft as part of the Windows Assessment and Deployment Toolkit and is also available within the Windows Recovery Environment (‘WinRE’). The DISM utility allows the deployment image file to be mounted to a folder path on a Windows host, whereupon its content may be modified directly as with any other NTFS file system (i.e.
    [Show full text]
  • Multimedia Systems DCAP303
    Multimedia Systems DCAP303 MULTIMEDIA SYSTEMS Copyright © 2013 Rajneesh Agrawal All rights reserved Produced & Printed by EXCEL BOOKS PRIVATE LIMITED A-45, Naraina, Phase-I, New Delhi-110028 for Lovely Professional University Phagwara CONTENTS Unit 1: Multimedia 1 Unit 2: Text 15 Unit 3: Sound 38 Unit 4: Image 60 Unit 5: Video 102 Unit 6: Hardware 130 Unit 7: Multimedia Software Tools 165 Unit 8: Fundamental of Animations 178 Unit 9: Working with Animation 197 Unit 10: 3D Modelling and Animation Tools 213 Unit 11: Compression 233 Unit 12: Image Format 247 Unit 13: Multimedia Tools for WWW 266 Unit 14: Designing for World Wide Web 279 SYLLABUS Multimedia Systems Objectives: To impart the skills needed to develop multimedia applications. Students will learn: z how to combine different media on a web application, z various audio and video formats, z multimedia software tools that helps in developing multimedia application. Sr. No. Topics 1. Multimedia: Meaning and its usage, Stages of a Multimedia Project & Multimedia Skills required in a team 2. Text: Fonts & Faces, Using Text in Multimedia, Font Editing & Design Tools, Hypermedia & Hypertext. 3. Sound: Multimedia System Sounds, Digital Audio, MIDI Audio, Audio File Formats, MIDI vs Digital Audio, Audio CD Playback. Audio Recording. Voice Recognition & Response. 4. Images: Still Images – Bitmaps, Vector Drawing, 3D Drawing & rendering, Natural Light & Colors, Computerized Colors, Color Palletes, Image File Formats, Macintosh & Windows Formats, Cross – Platform format. 5. Animation: Principle of Animations. Animation Techniques, Animation File Formats. 6. Video: How Video Works, Broadcast Video Standards: NTSC, PAL, SECAM, ATSC DTV, Analog Video, Digital Video, Digital Video Standards – ATSC, DVB, ISDB, Video recording & Shooting Videos, Video Editing, Optimizing Video files for CD-ROM, Digital display standards.
    [Show full text]
  • THE FUTURE of IDEAS This Work Is Licensed Under a Creative Commons Attribution-Noncommercial License (US/V3.0)
    less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page i THE FUTURE OF IDEAS This work is licensed under a Creative Commons Attribution-Noncommercial License (US/v3.0). Noncommercial uses are thus permitted without any further permission from the copyright owner. Permissions beyond the scope of this license are administered by Random House. Information on how to request permission may be found at: http://www.randomhouse.com/about/ permissions.html The book maybe downloaded in electronic form (freely) at: http://the-future-of-ideas.com For more permission about Creative Commons licenses, go to: http://creativecommons.org less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page iii the future of ideas THE FATE OF THE COMMONS IN A CONNECTED WORLD /// Lawrence Lessig f RANDOM HOUSE New York less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page iv Copyright © 2001 Lawrence Lessig All rights reserved under International and Pan-American Copyright Conventions. Published in the United States by Random House, Inc., New York, and simultaneously in Canada by Random House of Canada Limited, Toronto. Random House and colophon are registered trademarks of Random House, Inc. library of congress cataloging-in-publication data Lessig, Lawrence. The future of ideas : the fate of the commons in a connected world / Lawrence Lessig. p. cm. Includes index. ISBN 0-375-50578-4 1. Intellectual property. 2. Copyright and electronic data processing. 3. Internet—Law and legislation. 4. Information society. I. Title. K1401 .L47 2001 346.04'8'0285—dc21 2001031968 Random House website address: www.atrandom.com Printed in the United States of America on acid-free paper 24689753 First Edition Book design by Jo Anne Metsch less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page v To Bettina, my teacher of the most important lesson.
    [Show full text]
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Creating WIM Images of Windows XP For
    Creating WIM images of Windows for system deployment using Windows PE 10/17/2008 Isaac Holmes University of Notre Dame Table of Contents Introduction: ................................................................................................................................................. 4 Requirements: ............................................................................................................................................... 5 Creating a basic Windows PE disk for troubleshooting or image capture or deployment: .......................... 6 Installing Drivers ........................................................................................................................................... 8 Installing drivers to offline Windows PE image: ....................................................................................... 8 Installing drivers to running Windows PE: ................................................................................................ 8 Capturing a WIM disk images using Windows PE and ImageX: .................................................................... 9 Capture to USB or local drive: ................................................................................................................... 9 Capture to a network file share: ............................................................................................................. 10 Partition and Format the Hard Drive from Windows PE: ..........................................................................
    [Show full text]
  • Introducing Windows 8 an Overview IT Professionals
    Introducing Windows® 8 An Overview for IT Professionals Jerry Honeycutt PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2012 Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. Library of Congress Control Number (PCN): 2012950240 ISBN: 978-0-7356-7050-1 Microsoft Press books are available through booksellers and distributors worldwide. If you need support related to this book, email Microsoft Press Book Support at [email protected]. Please tell us what you think of this book at http://www.microsoft.com/learning/booksurvey. Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty/ Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other marks are property of their respective owners. The example companies, organizations, products, domain names, email addresses, logos, people, places, and events depicted herein are fictitious. No association with any real company, organization, product, domain name, email address, logo, person, place, or event is intended or should be inferred. This book expresses the author’s views and opinions. The information contained in this book is provided without any express, statutory, or implied warranties. Neither the authors, Microsoft Corporation, nor its resellers, or distributors will be held liable for any damages caused or alleged to be caused either directly or indirectly by this book. Acquisitions Editor: Anne Hamilton Developmental Editor: Valerie Woolley Project Editor: Valerie Woolley Editorial Production: Christian Holdener, S4Carlisle Publishing Services Technical Reviewer: Bryan Edge-Salois; Technical Review services provided by Content Master, a member of CM Group, Ltd.
    [Show full text]
  • Zenworks Preboot Services and Imaging Reference Includes Information to Help You Successfully Use Preboot Services and Imaging in a Zenworks System
    ZENworks 2017 Preboot Services and Imaging Reference December 2016 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.microfocus.com/company/legal/. Copyright © 2016 Micro Focus Software Inc. All rights reserved. Contents About This Guide 9 1 Overview 11 1.1 Support Matrix for ZENworks Imaging . 11 1.2 Brief Overview . 12 1.2.1 Preboot Services Functionality . 12 1.2.2 Preboot Services Strategies . .13 1.2.3 Preboot Bundles . 13 1.2.4 Configuring Preboot Services . 14 1.2.5 Setting Up Devices to Use Preboot Bundles . 15 1.3 What Is the Preboot Execution Environment (PXE)?. 16 1.3.1 Understanding How Preboot Services Uses PXE . 16 1.3.2 Understanding the ZENworks NBPs . 17 1.3.3 Preparing to Use PXE . 18 1.4 Preboot Services Functionality. 18 1.4.1 Preboot Bundles . 19 1.4.2 Preboot Services Menu . .22 1.4.3 Non-Registered Device Settings . 23 1.4.4 Device Imaging Work Assignment . 24 1.4.5 Server Referral List . 25 1.4.6 Intel Active Management Technology (AMT) . 26 1.5 The Preboot Services Processes. 27 1.5.1 A Typical Preboot Services Operation . 27 1.5.2 Illustrating the Preboot Services Processes . 28 1.6 Preboot Strategies . 35 1.6.1 Automating Installations and Imaging Tasks . 35 1.6.2 Creating, Installing, and Restoring Standard Images . 36 1.6.3 Reimaging Corrupted Devices. 36 1.6.4 Restoring Lab Devices to a Clean State .
    [Show full text]
  • Windows Deployment Toolkit Overview
    Application Compatibility Manager (ACM) is significantly updated and is now the functional centerpiece of ACT. The new Runtime Analysis Package (RAP) gathers compatibility information and replaces the issue detectors and down-level agents from previous ACT releases. RAP runs in the background on the computers where application testing is being performed. Inventory collection now supports inventories of 64-bit applications and ActiveX issues, and other Internet Explorer add-ons. Application compatibility information is now focused on operating system deployment. Compatibility information for updates has been removed. For more information, see Application Compatibility Toolkit. Deployment and Imaging You can use the following tools to customize Windows images and to automate installation and image management. Deployment Image Servicing and Management (DISM) enables you to capture, apply, and service Windows images. DISM has the following new features: Command-line options to capture, apply, and mount an image file. This functionality was previously available in the ImageX tool. ImageX is deprecated in this release. DISM PowerShell cmdlets, which enable you to use PowerShell to create and deploy images. Support for mounting and servicing Virtual Hard Disk (.vhd) files and Windows Imaging Format (.wim) files. A new API to enable programmatic management of Windows images. Windows System Image Manager (Windows SIM) enables you to create answer files to use during Windows deployment. Windows Help & Support Customization Tools enable you to customize the Windows help experience. You can customize three pages in Help and Support: Home, Escalation, and the new Browse page. On these pages you can add your information, links to FAQs, and links to your top-level custom topics, so customers can find the Help they need without picking up the phone.
    [Show full text]
  • Technology Professionals Enjoy Productivity, Enhanced Security with System Upgrade
    Windows Vista Customer Solution Case Study Technology Professionals Enjoy Productivity, Enhanced Security with System Upgrade Customer: CDW “Our deployment of Windows Vista was one of the Web Site: www.cdw.com easiest such projects we have ever undertaken.” Customer Size: 6,300 employees Country or Region: United States Industry: Information technology Jaime Waterfield, Solutions Manager, Microsoft Team, CDW Customer Profile As a highly successful system integrator and solution provider to CDW is a U.S.$8.1 billion technology- solutions company that was founded in organizations of all sizes, CDW practices what it preaches by 1984 and today employs 6,300 people. ensuring that its own technology professionals have the most Software and Services advanced software available. To that end, CDW has deployed Windows Vista Enterprise Windows Vista® to coworkers on its Microsoft team, all of them Microsoft Office − Microsoft Office SharePoint Server mobile. As a result, those employees are enjoying significant 2007 improvements in productivity and security. Microsoft Server Product Portfolio − Windows Server 2003 Business Needs customers. By using such solutions − Microsoft Exchange Server 2007 Named by Fortune magazine in 2008 as one internally, the CDW Microsoft team can − Microsoft System Center of America’s Most Admired Companies, demonstrate its technology leadership, and Configuration Manager 2007 Vernon Hills, Illinois–based CDW is a leading its coworkers can speak from experience provider of technology solutions for when recommending and implementing business, government, and education. With those solutions for customers. an employee base of 6,300, CDW serves customers across the United States, offering Solution expertise in the areas of unified communica- Because of its longtime commitment to tions, security, remote managed services, using Microsoft technologies and its need for virtualization, and desktop optimization.
    [Show full text]
  • Windows Vista Preparing for Deployment
    Windows Vista Preparing for deployment Nathan Mercer Microsoft NZ http://blogs.technet.com/nmercer [email protected] Agenda Deployment Tools Image Based Setup WIM Group Policy Application Compatibility Image Based Setup Windows Vista ships as a Sysprep’d image (install.WIM) aka “Staged” Setup applies (install.WIM) Images, using Unattend answer files (Unattend.XML) for custom installation Two ways to “Install” Vista Apply install.WIM and use Unattend.XML to customise setup.EXE Install Vista, configure, capture, and deploy using Vista Imaging tools (ImageX) Windows Imaging Format (WIM) File-based Image Format Introduced with SMS 2003 OSD Feature Pack Store Multiple Images within one actual file Hardware agnostic Enables compression and single instancing Service an image offline Install a disk image on partitions of any size N on “destructive” Provides API for WIM image for developers ImageX Command Line Driven Runs within WinPE, Vista, or Longhorn Captures a volume to a WIM Apply WIM to a volume Numerous Command-line options /appendAppends a volume image into an existing WIM file /applyApplies a volume image to the specified drive /captureCaptures a volume image into a new WIM file /commitCommits the changes made to a mounted WIM /compressSets compression type to none, fast, or maximum /configUses the specified file to set advanced options /deleteDeletes an image from a WIM file with multiple images /dirDisplays a list of files and folders within a volume image /exportTransfers an image from one WIM file to another WIM file/ infoReturns
    [Show full text]
  • UNITED STATES DISTRICT COURT for the DISTRICT of COLUMBIA ______) UNITED STATES of AMERICA, ) ) Plaintiff, ) ) V
    UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ____________________________________ ) UNITED STATES OF AMERICA, ) ) Plaintiff, ) ) v. ) Civil Action No. 98-1232 (TPJ) ) MICROSOFT CORPORATION, ) ) Defendant. ) ) ____________________________________) ) STATE OF NEW YORK, ex rel.) Attorney General ELIOT SPITZER, ) et al.,) ) Plaintiffs and ) Counterclaim-Defendants, ) ) v. ) Civil Action No. 98-1233 (TPJ) ) MICROSOFT CORPORATION, ) ) Defendant and ) Counterclaim-Plaintiff. ) ____________________________________) FINDINGS OF FACT These consolidated civil antitrust actions alleging violations of the Sherman Act, §§ 1 and 2, and various state statutes by the defendant Microsoft Corporation, were tried to the Court, sitting without a jury, between October 19, 1998, and June 24, 1999. The Court has considered the record evidence submitted by the parties, made determinations as to its relevancy and materiality, assessed the credibility of the testimony of the witnesses, both written and oral, and ascertained for its purposes the probative significance of the documentary and visual evidence presented. Upon the record before the Court as of July 28, 1999, at the close of the admission of evidence, pursuant to FED. R. CIV. P. 52(a), the Court finds the following facts to have been proved by a preponderance of the evidence. The Court shall state the conclusions of law to be drawn therefrom in a separate Memorandum and Order to be filed in due course. I. BACKGROUND 1. A “personal computer” (“PC”) is a digital information processing device designed for use by one person at a time. A typical PC consists of central processing components (e.g., a microprocessor and main memory) and mass data storage (such as a hard disk). A typical PC system consists of a PC, certain peripheral input/output devices (including a monitor, a keyboard, a mouse, and a printer), and an operating system.
    [Show full text]