Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x

Software-Other

37K

Solutions

38K

Contributors

Software is any set of instructions that directs a computer to perform specific tasks or operations. Computer software consists of programs, libraries and related non-executable data (such as documentation). Computer software is non-tangible, contrasted with computer hardware, which is the physical component of computers. Software written in a machine language is known as "machine code". However, in practice, software is usually written in high-level programming languages than machine language. High-level languages are translated into machine language using a compiler or interpreter or a combination of the two.

Share tech news, updates, or what's on your mind.

Sign up to Post

Want to know how to use Exchange Server Eseutil command? Go through this article as it gives you the know-how.
0
Migrating Your Company's PCs
LVL 4
Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

The core idea of this article is to make you acquainted with the best way in which you can export Exchange mailbox to PST format.
0
 
LVL 25

Expert Comment

by:Brian B
Comment Utility
For mass mailbox backups in Exchange, you should be using a proper backup and recovery system. See my post, PSTs are not reliable for that purpose.
0
 
LVL 15

Expert Comment

by:Ajit Singh
Comment Utility
Thanks for sharing this post.

I will definitely give try to your tool. However, I have tried few solutions but one which works i.e. Kernel: https://www.nucleustechnologies.com/edb-to-pst.html.

Usually, I always give preference to manual procedures specially script and I would like to share an informative article through which you can export Exchange 2010, 2013 and 2016 mailbox to PST using PowerShell cmdlet New-MailboxExportRequest: http://expert-advice.org/2017/09/export-exchange-mailboxes-pst-file-using-powershell-cmdlet/
0
Are you an Exchange administrator employed with an organization? And, have you encountered a corrupt Exchange database due to which you are not able to open its EDB file. This article will explain all the steps to repair corrupt Exchange database.
0
One-stop solution for Exchange Administrators to address all MS Exchange Server issues, which is known by the name of Stellar Exchange Toolkit.
0
I originally wrote this article to compare SARDU and YUMI, but have now added Easy2Boot, since that is the one I currently use and find the easiest to create and alter.
1
If you're a modern-day technology professional, you may be wondering if certifications are really necessary. They are. Here's why.
6
 
LVL 14

Expert Comment

by:Justin Pierce
Comment Utility
Hi Gene,

Unfortunately, I ran smack into this wall. I made the mistake of thinking my traditional education and work experience would carry me through in this industry because I didn't factor in the most important of variables "change".

Being born in the 70's and growing up in the 80's (my generation is called The Net Generation)  I was taught that degrees were vital to grabbing a good job, and that work experience was proof of your skills. For the most part if you went to a 4 year college (prestigious or well-known was better), maintained a good GPA, had an inside connection to the company you wanted to work for, were willing to conform to a dress code, you were almost guaranteed a job. Not so anymore.

To keep things short, my work as a government contractor kept me deployed out with my customer (US Army Air Defense) for months at a time where I taught officers and soldiers how to be System Administrators and run tactical networks in austere environments. Needless to say, I didn't have much time to work on grabbing certifications, but when I found an hour to use, I worked on grabbing certs that were tied to universities. That was a mistake.

Why?

Because "change" happened and industry recognized certs became a thing. Certs became so important my colleagues and I were told that DoDD 8570 was being put into place and that we would have to grab a few certs to prove our skills or risk being dropped from the contracts we were working on (of course we all laughed). We laughed not because we were arrogant, but because the team was comprised of Warrant Officers, Navy Chiefs, and Army SFCs, who all had 20+ years each in specialized military training. Not too long after we were told about DoDD 8570, Sequestration took place and killed the contract. That left us guys with work experience and degrees scrambling to get a few certs that pertained to the fields we were already working in. It was very hard for many of us to train up, grab a cert, and apply for a job before the mortgage payment became an issue (it worked out for most of us).

Not the fairest of lessons to learn, but when has life ever been fair, or change been halted in its tracks?
6
 
LVL 17

Expert Comment

by:Kyle Santos
Comment Utility
Justin's comment should be an article.  My kid is almost 2 and I'm thinking about how I can prepare him in the work force already so he has better advantages than I ever did!
0
This month, Experts Exchange’s free Course of the Month is focused on CompTIA IT Fundamentals.
0
Ever wonder what it's like to get hit by ransomware? "Tom" gives you all the dirty details first-hand – and conveys the hard lessons his company learned in the aftermath.
5
 
LVL 12

Expert Comment

by:Andrew Leniart
Comment Utility
Thanks for sharing your story. Ransomware is a topic I follow closely and have a lot of interest in. Sorry to hear you were hit by these criminal scum bags and while it irks me to know they profited from your misfortune not once, but twice, I understand the dilemma you were faced with. Backups are something we all tend to fall lax with at times and this story highlights the reasons we all need to stay vigilant. Good luck for the future.
0
 
LVL 1

Expert Comment

by:Josh Petraglia
Comment Utility
Education is Power!

Also, (offline) Backups are your best friend. Just saying.
0
In this article I discuss my selections of the Top Four free Outlook OST File Viewers available. Open, view and read even damaged OST files by using these tools. They all provide a clear preview of all data such as emails, notes, tasks, calendars, etc., in just a few number of clicks.
0
Curious about the latest ransomware attack? Check out our timeline of events surrounding the spread of this new virus along with tips on how to mitigate the damage.
6
 
LVL 7

Expert Comment

by:Nicholas
Comment Utility
1
The top UI technologies you need to be aware of
The top UI technologies you need to be aware of

An important part of the job as a front-end developer is to stay up to date and in contact with new tools, trends and workflows. That’s why you cannot miss this upcoming webinar to explore the latest trends in UI technologies!

This post contains step-by-step instructions for setting up alerting in Percona Monitoring and Management (PMM) using Grafana.
0
Invest in your employees with these five simple steps to improve employee engagement and retention.
7
Speed up a Slow Computer
There are many software programs on offer that will claim to magically speed up your computer. The best advice I can give you is to avoid them like the plague, because they will often cause far more problems than they solve. Try some of these "do it yourself" tips instead.
3
 

Expert Comment

by:Arkel Thompson
Comment Utility
Thank you very much, Andrew Leniart for that very informative and thorough article. Keep up the good work.
1
 
LVL 12

Author Comment

by:Andrew Leniart
Comment Utility
You're very welcome Arkel and thank you for the compliment, I appreciate it.
1

This article was originally published on Monitis Blog, you can check ithere.



If you have responsibility for software in production, I bet you’d like to know more about it. I don’t mean that you’d like an extra peek into the bowels of the source code or to understand its philosophical place in the universe.  Rather, I bet you’d like to know more about how it behaves in the wild.

 

After all, from this opaque vantage point comes the overwhelming majority of maddening defects.  “But it doesn’t do that in our environment,” you cry.  “How can we even begin to track down a user report of, ‘sometimes that button doesn’t work right?'”

 

To combat this situation we have, since programmer time immemorial, turned to the log file.  In that file, we find answers.  Except, we find them the way an archaeologist finds answers about ancient civilizations.  We assemble cryptic, incomplete fragments and try to use them to deduce what happened long after the fact.  Better than nothing, but not great.

 

Because of the incompleteness and the lag, we seek other solutions.  With the rise in sophistication of tooling and the growth of the DevOps movement, we close the timing gap via monitoring.  Rather than wait for a user to report an error and asking for a log file, we get out in front of the matter.  When something flies off the rails, our monitoring tools quickly alert us, and we begin triage immediately.



Common Monitoring Use Cases


Later in this post, I will get imaginative.  In writing this, I intend to expose you to some less common monitoring ideas that you might at least contemplate, if not outright implement.  But for now, let’s consider some relative blue chip monitoring scenarios.  These will transcend even the basic nature of the application and apply equally well to web, mobile, or desktop apps.

 

Monitis offers a huge variety of monitoring services, as the name implies.  You can get your bearings about the full offering here.  This means that if you want to do it, you can probably find an offering of to do it unless you’re really out there.  Then you might want to supplement these offering with some customized functionality for your own situation.

 

But let’s say you’d just signed up for the service and wanted to test drive it.  I can think of nothing simpler than “is this thing on?”  Wherever it runs, you’d love some information about whether it runs when it should.  On top of that, you’d probably also like to know whether it dies unexpectedly and ignobly.  When your app crashes embarrassingly, you want to know about it.

 

Once you’ve buttoned up the real basics, you might start to monitor for somewhat more nuanced situations.  Does your code gobble up too many hardware resources, causing poor experience or added expense?  Does it interact with services or databases that fail or go offline?  In short, does your application wobble into sub-optimal states?

 

But what if we look beyond those basics?  Let’s explore some things you may never have contemplated monitoring about your software.



User Engagement


Facebook has developed some reputation around having deployment nirvana.  They constantly roll to production and use a sophisticated series of checks, balances, tests, and monitoring to alert them to problems needing correction.  If the number of baby pictures in my feed is any indication, I’d say they’re doing pretty well.

 

But what happens if Facebook pushes something to production with a mistake not easily caught by automated unit tests?  For instance, what if they accidentally deployed some CSS that turned the “post” button and its text the same color as the background.  The flow of baby pictures would cease, even as all tests passed with flying colors.

 

Monitis offers “real user monitoring,”  which generalizes a specific case can address this situation.  You may want to monitor user behavior in terms of how they engage with the site.  If Facebook monitors how many times per second its users click “post,” and they see that drop to 0 after a production roll, they’ll know they have an issue almost immediately.  Even if they don’t know what causes it, they can triage and mitigate almost immediately.



Revenue


If you have responsibility for any sort of e-commerce operation, I strongly encourage you to monitor your revenue.  In a sense, you might consider this a specific instance of user engagement.  You’ll have some sort of normal drip of people making purchases.  Anything affecting that presents you with an obvious red flag.

 

You might be tempted to think of this as an accounting problem more than a technical one.  Let techies monitor the nuts and bolts and accounting can worry about P&L?  I don’t advise it. Purchases count as arguably the most important metric.  They form the lifeblood of your business.



Bounces


You mainly think of a “bounce” when you think of web applications.  Google defines bounce as “a single-page session on your site.”  I believe this plays on the opposite of “sticking.”  People land, and “bounce off” of your site.

 

I’m going to re-appropriate the term a bit for our purposes here and generalize it to all application platforms.  You might want to monitor the rate at which users exit your application from a particular page/screen.

 

When they leave from, say, an “exit” screen, then fine.  You’d want a high percentage of departures from expected places.  But if people being to leave from a place you’d expect them to remain engaged, that might give you insight into a problem of some kind.  This holds doubly true if it suddenly spikes in one particular place.



User Experience Concerns 


This particular concern would require some fairly sophisticated monitoring capabilities, most likely instrumented from within.  If you do implement such a thing, take care not to impact performance.  But, if you’re up for it, you might learn some interesting things.

 

Consider monitoring user behavior for user experience concerns.  For instance, do users consistently dismiss a dialog far too quickly to have read it?  Or perhaps do they all tend to execute the same key sequences to navigate through several screens?  If so, you might have located opportunities to improve your user experience.  Get rid of superfluous dialog messages and see about adding shortcuts for things they do frequently.

 

And you certainly aren’t limited by my suggestions here.  If you have the capability to monitor interactions like this, study your own users with their particular happens and look to improve their experience.



Time to Load Visual Elements


This is another item that you hear about most frequently in websites.  But, as with my looser interpretation of the “bounce” concept, you could really measure this anywhere.  After all, sluggishness is sluggishness.

 

If you find yourself in a position to monitor the visual performance of your software, you stand to benefit from doing so.  Few things torpedo the user experience as quickly as maddeningly slow loads.  If this is happening, you want to know about it.

 

This holds doubly true for visual elements superfluous or non-essential to the experience itself. In the world of websites, think of ads or random widgets.  And, while you can test a lot of this for yourself, concerns may arise in the wild that you can’t mimic in your own shop.



Think of Your Own in the Spirit of Innovation 


I’ve enjoyed the exercise in exploring what you might want to monitor.  As both an entrepreneur and software developer, I like thinking about possible implementations, offerings, and features.

 

In fact, that captures what I find so appealing about the DevOps movement.  As we marry software creation and software delivery, we open up an entirely new category of innovation, that requires new and powerful tools.  We can then combine those tools with the inventive spirit to deliver ever-higher quality software.



Sign up for Monitis FREE 15-day full-featured trial! Premium plan starting from $12/month only!



0
SCCM Add to GRP TS
Adding Computers to AD groups through an SCCM Task Sequence
1
Troubleshooting common task sequence error codes
1
BDR
Binary Differential Replication, What it is, how it works and how it differs from standard delta file replication
1
The following article is intended as a guide to using PowerShell as a more versatile and reliable form of application detection in SCCM.
1
 
LVL 8

Expert Comment

by:Senior IT System Engineer
Comment Utility
Hi SCCMCanuck,

Which of the Powershell line that I can edit safely to suit my environment ?
0
 
LVL 9

Author Comment

by:SCCMCanuck
Comment Utility
Thanks for your interest. At the moment the following lines are safe to change

[version]$InstallerVersion = '8.0.1210.13'
$AppName = 'Java*'

The value of $AppName variable is a wildcard string that corresponds with the DisplayName registry value, where as $InstalledVersion corresponds to DisplayVersion.

You can modify any part of the script to accommodate any type of detection method and use and/or statements to create a more restrictive set of criteria. The goal of my example is to make the SCCM client agent believe that Java is installed if its version is greater than or equal to the value of $InstallerVersion in the Variable Declaration section

Registry.PNG
1
The following article discusses and demonstrates the advantages of using Pull Distribution Points in SCCM 2012 SP1 or higher as opposed to traditional push based architecture
0
Learn how to optimize MySQL for your business need
LVL 3
Learn how to optimize MySQL for your business need

With the increasing importance of apps & networks in both business & personal interconnections, perfor. has become one of the key metrics of successful communication. This ebook is a hands-on business-case-driven guide to understanding MySQL query parameter tuning & database perf

Developer portfolios can be a bit of an enigma—how do you present yourself to employers without burying them in lines of code?  A modern portfolio is more than just work samples, it’s also a statement of how you work.
2
Pen Tablet
All of the resources available today make learning a new digital media easier than ever-- if you know where to begin. This is a clear, simple guide to a few of the basic digital art mediums and how to begin learning them on your own.
2
How to Build a Scalable Website
This guide will walk you through the essential considerations and tech stack for building scalable websites. Know how to grow your business the smart way!
0
In this article, you will read about the trends across the human resources departments for the upcoming year. Some of them include improving employee experience, adopting new technologies, using HR software to its full extent, and integrating artificial intelligence into the HR department.
0
Skype for Business
Skype is a P2P (Peer to Peer) instant messaging and VOIP (Voice over IP) service – as well as a whole lot more.
2
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you should read this article.
3

Software-Other

37K

Solutions

38K

Contributors

Software is any set of instructions that directs a computer to perform specific tasks or operations. Computer software consists of programs, libraries and related non-executable data (such as documentation). Computer software is non-tangible, contrasted with computer hardware, which is the physical component of computers. Software written in a machine language is known as "machine code". However, in practice, software is usually written in high-level programming languages than machine language. High-level languages are translated into machine language using a compiler or interpreter or a combination of the two.