CHIME: an Efficient Error-Tolerant Chinese Pinyin Input Method

Total Page:16

File Type:pdf, Size:1020Kb

CHIME: an Efficient Error-Tolerant Chinese Pinyin Input Method CHIME: An Efficient Error-Tolerant Chinese Pinyin Input Method Yabin Zheng1, Chen Li2, and Maosong Sun1 1State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China 2Department of Computer Science, University of California, Irvine, CA 92697-3435, USA fyabin.zheng,[email protected], [email protected] Abstract Chinese Pinyin input methods are very importan- t for Chinese language processing. In many cases, Figure 1: Typical Chinese Pinyin input method for a correct users may make typing errors. For example, a user Pinyin (left) and a mistyped Pinyin (right). wants to type in “shenme” (什么, meaning “what” in English) but may type in “shenem” instead. Ex- isting Pinyin input methods fail in converting such to the corresponding Chinese words. In the running example, a Pinyin sequence with errors to the right Chinese for the mistyped Pinyin “shanghaai”, we can find a similar words. To solve this problem, we developed an Pinyin “shanghai”, and suggest Chinese words including “上 efficient error-tolerant Pinyin input method called 海”, which is indeed what the user is looking for. “CHIME” that can handle typing errors. By incor- When developing an error-tolerant Chinese input method, porating state-of-the-art techniques and language- we are facing two main challenges. First, Pinyins and Chi- specific features, the method achieves a better per- nese characters have two-way ambiguity. Many Chinese formance than state-of-the-art input methods. It can characters have multiple pronunciations. The character “和” efficiently find relevant words in milliseconds for can be pronounced as “hé”, “hè”, “huó”, “huò”, and “hú”. an input Pinyin sequence. On the other hand, different Chinese characters can have the same pronunciation. Both characters “人” and “仁” have the same pronunciation “rén”. The ambiguity makes it techni- 1 Introduction cally challenging to do Pinyin-to-Chinese conversion. Notice Chinese uses a logographic writing system, while English and that it is important for us to suggest relevant words to a user, many other romance languages use an alphabetic writing sys- since otherwise the user may be annoyed by seeing suggested tem. Users cannot type in Chinese characters directly using words that are irrelevant to the input sequence. Thus we need a Latin keyboard. Pinyin input methods have been widely to detect and correct mistyped Pinyins accurately. used to allow users to type in Chinese characters using such Another challenge is how to do the correction efficiently. a keyboard. Pinyin input methods convert a Pinyin sequence Existing input methods suggest Chinese words as a user types to the corresponding Chinese words, where Pinyins are used in a Pinyin sequence letter by letter. Studies have shown that to represent pronunciations of Chinese words. For instance, we need to answer a keystroke query within 100 ms in order suppose a user wants to type in the Chinese word “上海” (the to achieve an interactive speed, i.e., the user does not feel any city Shanghai). He types in the corresponding Pinyin “shang- delay. Achieving such a high speed is especially importan- hai”, and the input method displays a list of Chinese words t when the method is used by a Web server that can receive with this pronunciation, as shown in Figure 1 (left). The user queries from many users, and requires a method to find rele- selects the word “上海” as the result. vant Chinese words for a mistyped sequence efficiently. As users of other languages, Chinese users often make er- In this paper we develop a novel error-tolerant Chinese rors when typing in a Pinyin sequence. Existing Pinyin-based Pinyin input method that can meet both requirements of high methods have error-tolerant features such as fuzzy tone for accuracy and high efficiency. It is called “CHIME”, which Chinese southern dialects. However, there are many input er- stands for “CHinese Input Method with Errors.” CHIME rors that cannot be handled by these methods. In our example works on a Pinyin sequence as follows. For a mistyped Pinyin of “shanghai” (上海), the user may make typos, thus type in in the sequence that does not exist in a Pinyin dictionary, “shanghaai” instead. As shown in Figure 1 (right), typical we find similar Pinyins as candidates. We rank them using methods cannot return the right word. This limitation affects a noisy channel model and Chinese-specific features to find user experiences greatly, since he has to identify and correct those that are most likely what the user intends to type in for the typos, or cannot find the right word. this Pinyin. Finally, we use a statistical language model on In this paper, we study how to automatically detect and cor- the input sequence to find the most likely sequence of Chi- rect typing errors in an input Pinyin sequence, and convert it nese words. The rest of this paper is organized as follows. Section 2 3 Correcting a Single Pinyin reviews related work. Section 3 analyzes typing errors at the We first study the problem of how to correct a single Pinyin. Pinyin level. In Section 4, we study how to convert a Pinyin Given a dictionary D of Pinyins and an input Pinyin p that is sequence to a sequence of Chinese words. In Section 5, we not in the dictionary, our method CHIME finds a set of can- report experimental results. Section 6 concludes the paper didate Pinyins w 2 D that are most likely to be erroneously and discusses future work. typed in as p. First, we do a similarity search to find candidate Pinyins that are similar to the input Pinyin. Second, we rank 2 Related Work these candidates and find those with the highest probabilities to be what the user intends to type in. Chen and Lee [2000] used a statistical segmentation and a trigram-based language model to convert Chinese Pinyin se- 3.1 Finding Similar Pinyins quences to Chinese word sequences. They also proposed an Measuring Pinyin Similarity: As shown in [Cooper, 1983], error model for Pinyin spelling correction. However, they on- most typing errors can be classified into four categories: in- ly correct single-character errors, while our method can cor- sertions, deletions, substitutions, and transpositions. There- rect multi-character errors. fore, in this paper we use edit distance to measure the number Kwok and Deng [2002] proposed a method of extracting of errors between a candidate Pinyin and a mistyped Pinyin. Chinese Pinyin names from English text and suggesting cor- Formally, the edit distance between two strings is the mini- responding Chinese characters to these Pinyins. However, mum number of single-character operations required to trans- their approach can only convert Pinyin names to Chinese form one sting to the other. We generalize the definition of characters, while our method can handle general words. edit distance by allowing transpositions. There are studies on spelling correction mainly for English. We assume an upper threshold on the number of typing Brill and Moore [2000] introduce a noisy channel model for errors a user can make in a single Pinyin. In other words, for spelling correction based on generic string-to-string edit op- a mistyped Pinyin, we assume that the edit distance between erations. Without a language model, their error model gives the correct Pinyin and the input one is within the threshold. a 52% reduction in spelling correction error rate. With a Damerau [1964] showed that 80% of typing errors are caused language model, their model gives a 74% reduction in er- by a single edit operation. Using a threshold of 2, we can ror rate. Toutanova and Moore [2002] extend the work using find the correct Pinyin with a very high probability. For pronunciation information. They use pronunciation similar- example, for the Pinyin “sanghaai”, by finding those whose ities between words to achieve a better accuracy. Inspired edit distance to the input is within 2, we can find candidates by [Toutanova and Moore, 2002], we also take pronuncia- “shanghai”, “canghai”, and “wanghuai”. tion information in Chinese to gain better performance. More details are given in Section 3. Efficient Similarity Search: We adopt the state-of-the- [ et Cucerzan and Brill [2004] use information in search query art index structure and search algorithm proposed in Ji al. ] logs for spelling correction. Their approach utilizes an itera- , 2009 to find those similar candidate Pinyins efficiently. tive transformation of the input query strings into other cor- The main idea is to build a trie structure to index the Pinyins rect query strings according to statistics learned from search in the dictionary. As a user types in a Pinyin letter by letter, query logs. Sun et al. [2010] extract query-correction pairs the algorithm can on-the-fly do a similarity search to find by analyzing user behaviors encoded in the click-through da- those trie nodes, such that the edit distances between the ta, and then a phrase-based error model is trained and inte- corresponding prefixes and the input Pinyin are within a grated into a query speller system. Gao et al. [2010] make given threshold. From the trie nodes of these similar prefixes significant extensions to a noisy channel model and treat spel- we can find their leaf nodes as candidate similar Pinyins. woemng l checking as a statistical translation problem. Experiments Consider the sequence in our running example, “ gounai sanghaai shengchang niulai show that these extensions lead to remarkable improvements. le de ”. For each Pinyin, we find similar candidate Pinyins in the dictionary, whose edit [ ] Whitelaw et al. 2009 implement a system for spelling distance to the given Pinyin is no greater than 2.
Recommended publications
  • Desktop Migration and Administration Guide
    Red Hat Enterprise Linux 7 Desktop Migration and Administration Guide GNOME 3 desktop migration planning, deployment, configuration, and administration in RHEL 7 Last Updated: 2021-05-05 Red Hat Enterprise Linux 7 Desktop Migration and Administration Guide GNOME 3 desktop migration planning, deployment, configuration, and administration in RHEL 7 Marie Doleželová Red Hat Customer Content Services [email protected] Petr Kovář Red Hat Customer Content Services [email protected] Jana Heves Red Hat Customer Content Services Legal Notice Copyright © 2018 Red Hat, Inc. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]
  • Chinese Pinyin Aided IME, Input What You Have Not Keystroked Yet
    Chinese Pinyin Aided IME, Input What You Have Not Keystroked Yet Yafang Huang1;2, Hai Zhao1;2;∗, 1Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China 2Key Laboratory of Shanghai Education Commission for Intelligent Interaction and Cognitive Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China [email protected], [email protected] ∗ Abstract between pinyin syllables and Chinese characters. (Huang et al., 2018; Yang et al., 2012; Jia and Chinese pinyin input method engine (IME) Zhao, 2014; Chen et al., 2015) regarded the P2C as converts pinyin into character so that Chinese a translation between two languages and solved it characters can be conveniently inputted into computer through common keyboard. IMEs in statistical or neural machine translation frame- work relying on its core component, pinyin- work. The fundamental difference between (Chen to-character conversion (P2C). Usually Chi- et al., 2015) work and ours is that our work is a nese IMEs simply predict a list of character fully end-to-end neural IME model with extra at- sequences for user choice only according to tention enhancement, while the former still works user pinyin input at each turn. However, Chi- on traditional IME only with converted neural net- nese inputting is a multi-turn online procedure, work language model enhancement. (Zhang et al., which can be supposed to be exploited for fur- 2017) introduced an online algorithm to construct ther user experience promoting. This paper thus for the first time introduces a sequence- appropriate dictionary for P2C. All the above men- to-sequence model with gated-attention mech- tioned work, however, still rely on a complete in- anism for the core task in IMEs.
    [Show full text]
  • A Chinese Mobile Phone Input Method Based on the Dynamic and Self-Study Language Model
    A Chinese Mobile Phone Input Method Based on the Dynamic and Self-study Language Model Qiaoming Zhu, Peifeng Li, Gu Ping, and Qian Peide School of Computer Science & Technology of Soochow University, Suzhou, 215006 {qmzhu, pfli, pgu, pdqian}@suda.edu.cn Abstract. This paper birefly introduces a Chinese digital input method named as CKCDIM (CKC Digital Input Method) and then applies it to the Symbian OS as an example, and it also proposes a framework of input method which adopted the Client/Server architecture for the handheld computers. To improve the performance of CKCDIM, this paper puts forward a dynamic and self-study language model which based on a general language model and user language model, and proposes two indexes which are the average number of pressed-keys (ANPK) and the hit rate of first characters (HRFC) to measure the performance of the input method. Meanwhile, this paper brings forward a modified Church-Gale smoothing method to reduce the size of general language model to meet the need of mobile phone. At last, the experiments prove that the dynamic and self-study language model is a steady model and can improve the performance of CKCDIM. Keywords: Chinese Digital Input Method, Architecture of Input Method, Dynamic and Self-study Language Model, HRFC, ANPK. 1 Introduction With the developing of communication technology and the popularization of the mobile phone in China, the use of text message in mobile phone is growing rapidly. According to CCTV financial news report, the total number of Short Message Service use will grow from 300 billions in 2005 to 450 billions in 2006 in China.
    [Show full text]
  • Database Globalization Support Guide
    Oracle® Database Database Globalization Support Guide 19c E96349-05 May 2021 Oracle Database Database Globalization Support Guide, 19c E96349-05 Copyright © 2007, 2021, Oracle and/or its affiliates. Primary Author: Rajesh Bhatiya Contributors: Dan Chiba, Winson Chu, Claire Ho, Gary Hua, Simon Law, Geoff Lee, Peter Linsley, Qianrong Ma, Keni Matsuda, Meghna Mehta, Valarie Moore, Cathy Shea, Shige Takeda, Linus Tanaka, Makoto Tozawa, Barry Trute, Ying Wu, Peter Wallack, Chao Wang, Huaqing Wang, Sergiusz Wolicki, Simon Wong, Michael Yau, Jianping Yang, Qin Yu, Tim Yu, Weiran Zhang, Yan Zhu This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S.
    [Show full text]
  • Discover Your Phone
    Discover Your Phone accept, except as required by applicable law, liability for any error, omission or discrepancy between this user 262000 color guide and the product described. The device is meant to main screen be connected to GSM/GPRS networks. Back of the phone: Charger/USB camera lens connector Hard keys Stylus pen Also called Red key or On/Off key. Touch screen Hang up key • In menu or edit mode, short press to return to idle screen. Camera key • During an incoming call or call in progress, press to end the call Hang up, or reject the call. Cancel and On/Off key • When the phone is switched Answer key off, long press to switch on the Up key, phone. keypad lock • When the phone is switched Down key, Vibration on, long press to switch off the on/off key phone anytime. Also called Green key or Send key: Philips continuously strives to improve its products. Answer key • Answer a call or dial a phone Therefore, Philips reserves the rights to revise this user number guide or withdraw it at any time without prior notice. • In idle mode, press to view the Philips provides this user guide “as is” and does not dialed calls list. Up key • Browse the menu/list on the Side camera • In idle mode, short press to and same menu level. key enter the camera, long press to Down key • Browse SMS contents or other enter video camera. long text messages. • When in camera/video camera • Scroll to the previous or next preview mode, short press to picture when viewing pictures.
    [Show full text]
  • Input for Winforms
    ComponentOne Input for WinForms ComponentOne, a division of GrapeCity 201 South Highland Avenue, Third Floor Pittsburgh, PA 15206 USA Website: http://www.componentone.com Sales: [email protected] Telephone: 1.800.858.2739 or 1.412.681.4343 (Pittsburgh, PA USA Office) Trademarks The ComponentOne product name is a trademark and ComponentOne is a registered trademark of GrapeCity, Inc. All other trademarks used herein are the properties of their respective owners. Warranty ComponentOne warrants that the media on which the software is delivered is free from defects in material and workmanship, assuming normal use, for a period of 90 days from the date of purchase. If a defect occurs during this time, you may return the defective media to ComponentOne, along with a dated proof of purchase, and ComponentOne will replace it at no charge. After 90 days, you can obtain a replacement for the defective media by sending it and a check for $2 5 (to cover postage and handling) to ComponentOne. Except for the express warranty of the original media on which the software is delivered is set forth here, ComponentOne makes no other warranties, express or implied. Every attempt has been made to ensure that the information contained in this manual is correct as of the time it was written. ComponentOne is not responsible for any errors or omissions. ComponentOne’s liability is limited to the amount you paid for the product. ComponentOne is not liable for any special, consequential, or other damages for any reason. Copying and Distribution While you are welcome to make backup copies of the software for your own use and protection, you are not permitted to make copies for the use of anyone else.
    [Show full text]
  • China's Shanzhai Entrepreneurs Hooligans Or
    China’s Shanzhai Entrepreneurs Hooligans or Heroes? 《中國⼭寨企業家:流氓抑或是英雄》 Callum Smith ⾼林著 Submitted for Bachelor of Asia Pacific Studies (Honours) The Australian National University October 2015 2 Declaration of originality This thesis is my own work. All sources used have been acknowledGed. Callum Smith 30 October 2015 3 ACKNOWLEDGEMENTS I am indebted to the many people whose acquaintance I have had the fortune of makinG. In particular, I would like to express my thanks to my hiGh-school Chinese teacher Shabai Li 李莎白 for her years of guidance and cherished friendship. I am also grateful for the support of my friends in Beijing, particularly Li HuifanG 李慧芳. I am thankful for the companionship of my family and friends in Canberra, and in particular Sandy 翟思纯, who have all been there for me. I would like to thank Neil Thomas for his comments and suggestions on previous drafts. I am also Grateful to Geremie Barmé. Callum Smith 30 October 2015 4 CONTENTS ACKNOWLEDGEMENTS ................................................................................................................................ 3 ABSTRACT ........................................................................................................................................................ 5 INTRODUCTION .............................................................................................................................................. 6 THE EMERGENCE OF A SOCIOCULTURAL PHENOMENON ...................................................................................................
    [Show full text]
  • Inventory of Romanization Tools
    Inventory of Romanization Tools Standards Intellectual Management Office Library and Archives Canad Ottawa 2006 Inventory of Romanization Tools page 1 Language Script Romanization system for an English Romanization system for a French Alternate Romanization system catalogue catalogue Amharic Ethiopic ALA-LC 1997 BGN/PCGN 1967 UNGEGN 1967 (I/17). http://www.eki.ee/wgrs/rom1_am.pdf Arabic Arabic ALA-LC 1997 ISO 233:1984.Transliteration of Arabic BGN/PCGN 1956 characters into Latin characters NLC COPIES: BS 4280:1968. Transliteration of Arabic characters NL Stacks - TA368 I58 fol. no. 00233 1984 E DMG 1936 NL Stacks - TA368 I58 fol. no. DIN-31635, 1982 00233 1984 E - Copy 2 I.G.N. System 1973 (also called Variant B of the Amended Beirut System) ISO 233-2:1993. Transliteration of Arabic characters into Latin characters -- Part 2: Lebanon national system 1963 Arabic language -- Simplified transliteration Morocco national system 1932 Royal Jordanian Geographic Centre (RJGC) System Survey of Egypt System (SES) UNGEGN 1972 (II/8). http://www.eki.ee/wgrs/rom1_ar.pdf Update, April 2004: http://www.eki.ee/wgrs/ung22str.pdf Armenian Armenian ALA-LC 1997 ISO 9985:1996. Transliteration of BGN/PCGN 1981 Armenian characters into Latin characters Hübschmann-Meillet. Assamese Bengali ALA-LC 1997 ISO 15919:2001. Transliteration of Hunterian System Devanagari and related Indic scripts into Latin characters UNGEGN 1977 (III/12). http://www.eki.ee/wgrs/rom1_as.pdf 14/08/2006 Inventory of Romanization Tools page 2 Language Script Romanization system for an English Romanization system for a French Alternate Romanization system catalogue catalogue Azerbaijani Arabic, Cyrillic ALA-LC 1997 ISO 233:1984.Transliteration of Arabic characters into Latin characters.
    [Show full text]
  • DICOM PS3.5 2021C
    PS3.5​ DICOM PS3.5 2021d - Data Structures and Encoding​ Page 2​ PS3.5: DICOM PS3.5 2021d - Data Structures and Encoding​ Copyright © 2021 NEMA​ A DICOM® publication​ - Standard -​ DICOM PS3.5 2021d - Data Structures and Encoding​ Page 3​ Table of Contents​ Notice and Disclaimer ........................................................................................................................................... 13​ Foreword ............................................................................................................................................................ 15​ 1. Scope and Field of Application ............................................................................................................................. 17​ 2. Normative References ....................................................................................................................................... 19​ 3. Definitions ....................................................................................................................................................... 23​ 4. Symbols and Abbreviations ................................................................................................................................. 27​ 5. Conventions ..................................................................................................................................................... 29​ 6. Value Encoding ...............................................................................................................................................
    [Show full text]
  • The Challenge of Chinese Character Acquisition
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Faculty Publications: Department of Teaching, Department of Teaching, Learning and Teacher Learning and Teacher Education Education 2017 The hC allenge of Chinese Character Acquisition: Leveraging Multimodality in Overcoming a Centuries-Old Problem Justin Olmanson University of Nebraska at Lincoln, [email protected] Xianquan Chrystal Liu University of Nebraska - Lincoln, [email protected] Follow this and additional works at: http://digitalcommons.unl.edu/teachlearnfacpub Part of the Bilingual, Multilingual, and Multicultural Education Commons, Chinese Studies Commons, Curriculum and Instruction Commons, Instructional Media Design Commons, Language and Literacy Education Commons, Online and Distance Education Commons, and the Teacher Education and Professional Development Commons Olmanson, Justin and Liu, Xianquan Chrystal, "The hC allenge of Chinese Character Acquisition: Leveraging Multimodality in Overcoming a Centuries-Old Problem" (2017). Faculty Publications: Department of Teaching, Learning and Teacher Education. 239. http://digitalcommons.unl.edu/teachlearnfacpub/239 This Article is brought to you for free and open access by the Department of Teaching, Learning and Teacher Education at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Faculty Publications: Department of Teaching, Learning and Teacher Education by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. Volume 4 (2017)
    [Show full text]
  • Actionscript 3.0 Cookbook.Pdf
    ActionScript 3.0 Cookbook By Joey Lott, Darron Schall, Keith Peters ............................................... Publisher: O'Reilly Pub Date: October 01, 2006 ISBN: 0-596-52695-4 Pages: 592 Table of Contents | Index Well before Ajax and Microsoft's Windows Presentation Foundation hit the scene, Macromedia offered the first method for building web pages with the responsiveness and functionality of desktop programs with its Flash-based "Rich Internet Applications". Now, new owner Adobe is taking Flash and its powerful capabilities beyond the Web and making it a full-fledged development environment. Rather than focus on theory, the ActionScript 3.0 Cookbook concentrates on the practical application of ActionScript, with more than 300 solutions you can use to solve a wide range of common coding dilemmas. You'll find recipes that show you how to: Detect the user's Flash Player version or their operating system Build custom classes Format dates and currency types Work with strings Build user interface components Work with audio and video Make remote procedure calls using Flash Remoting and web services Load, send, and search XML data And much, much more ... Each code recipe presents the Problem, Solution, and Discussion of how you can use it in other ways or personalize it for your own needs, and why it works. You can quickly locate the recipe that most closely matches your situation and get the solution without reading the whole book to understand the underlying code. Solutions progress from short recipes for small problems to more complex scripts for thornier riddles, and the discussions offer a deeper analysis for resolving similar issues in the future, along with possible design choices and ramifications.
    [Show full text]
  • Windows Powershell Best Practices Windows Powershell Best Practices
    Windows PowerShell Best Practices Windows PowerShell Best Practices Expert recommendations, pragmatically applied Automate system administration using Windows PowerShell best practices—and optimize your operational efficiency. With this About the Author practical guide, Windows PowerShell expert and instructor Ed Ed Wilson, MCSE, CISSP, is a well-known Wilson delivers field-tested tips, real-world examples, and candid scripting expert and author of “Hey Windows Scripting Guy!”—one of the most popular advice culled from administrators across a range of business and blogs on Microsoft TechNet. He’s written technical scenarios. If you’re an IT professional with Windows several books on Windows scripting PowerShell experience, this book is ideal. for Microsoft Press, including Windows PowerShell 2.0 Best Practices and Windows PowerShell Scripting Guide. Discover how to: PowerShell • Use Windows PowerShell to automate Active Directory tasks • Explore available WMI classes and methods with CIM cmdlets • Identify and track scripting opportunities to avoid duplication • Use functions to encapsulate business logic and reuse code • Design your script’s best input method and output destination • Test scripts by checking their syntax and performance • Choose the most suitable method for running remote commands • Manage software services with Desired State Configuration Wilson BEST PRACTICES microsoft.com/mspress ISBN 978-0-7356-6649-8 U.S.A. $59.99 55999 Canada $68.99 [Recommended] 9 780735 666498 Operating Systems/Windows Server Celebrating 30 years! Ed Wilson 666498_Win_PowerShell_Best_Practices.indd 1 4/11/14 10:30 AM Windows PowerShell Best Practices Ed Wilson 666498_book.indb 1 12/20/13 10:50 AM Published with the authorization of Microsoft Corporation by: O’Reilly Media, Inc.
    [Show full text]