Skip to main content

Class questions for 5118A on October 6, 2008

Question for class: 5118A
Class Date: October 6, 2008
Location: Lantech Training – Indianapolis, IN
Below are the questions that we had to place in the “Question Parking Lot.” We answered them in class but I want to share with my readers what our up and coming MCPs are thinking about.

Question:
Where can we get a copy of Standard User Analyzer?

Answer:
The Standard User Analyzer can no longer be downloaded on its own. Microsoft has moved it into the Application Compatibility Toolkit 5.0. You will also have to install the Application Verifier to get it to work. This move makes sense since its purpose was for developers to determine if their creations will work in Vista. As part of a migration team, we can use it to make sure our legacy applications can function in the Vista environment and to also help us find a way to make it work.

Downloads:

ACT 5.0: http://www.microsoft.com/downloads/details.aspx?FamilyID=24da89e9-b581-47b0-b45e-492dd6da2971&DisplayLang=en

Application Verifier: http://www.microsoft.com/downloads/details.aspx?familyid=d2dd7ee0-aaa2-402a-821d-43795d6cf139&displaylang=en

Question:
What are the memory limitations for Ready Boost?

Answer:
Ready boost is a way to increase the speed of your Vista machine. It was designed for systems with 512 MB – 1 GB to help them along. The rest of us can utilize them for performance enhancements as well. We do this by adding a USB key to your computer. When you insert the memory stick into the PC and auto play starts, Click Ready boost. The memory limits are 256MB – 4 GB. Microsoft recommends a 1:1 ratio on flash to system memory on lower end systems and a 2.5:1 ration on flash to system memory on higher end systems. The 4GB limit is due to the FAT32 partition on the flash drive. 4GB is the largest file size it can handle.

Comments

Popular posts from this blog

Adding a Comment to a GPO with PowerShell

As I'm writing this article, I'm also writing a customization for a PowerShell course I'm teaching next week in Phoenix.  This customization deals with Group Policy and PowerShell.  For those of you who attend my classes may already know this, but I sit their and try to ask the questions to myself that others may ask as I present the material.  I finished up my customization a few hours ago and then I realized that I did not add in how to put a comment on a GPO.  This is a feature that many Group Policy Administrators may not be aware of. This past summer I attended a presentation at TechEd on Group Policy.  One organization in the crowd had over 5,000 Group Policies.  In an environment like that, the comment section can be priceless.  I always like to write in the comment section why I created the policy so I know its purpose next week after I've completed 50 other tasks and can't remember what I did 5 minutes ago. In the Group Policy module for PowerShell V3, th

Return duplicate values from a collection with PowerShell

If you have a collection of objects and you want to remove any duplicate items, it is fairly simple. # Create a collection with duplicate values $Set1 = 1 , 1 , 2 , 2 , 3 , 4 , 5 , 6 , 7 , 1 , 2   # Remove the duplicate values. $Set1 | Select-Object -Unique 1 2 3 4 5 6 7 What if you want only the duplicate values and nothing else? # Create a collection with duplicate values $Set1 = 1 , 1 , 2 , 2 , 3 , 4 , 5 , 6 , 7 , 1 , 2   #Create a second collection with duplicate values removed. $Set2 = $Set1 | Select-Object -Unique   # Return only the duplicate values. ( Compare-Object -ReferenceObject $Set2 -DifferenceObject $Set1 ) . InputObject | Select-Object – Unique 1 2 This works with objects as well as numbers.  The first command creates a collection with 2 duplicates of both 1 and 2.   The second command creates another collection with the duplicates filtered out.  The Compare-Object cmdlet will first find items that are diffe

How to list all the AD LDS instances on a server

AD LDS allows you to provide directory services to applications that are free of the confines of Active Directory.  To list all the AD LDS instances on a server, follow this procedure: Log into the server in question Open a command prompt. Type dsdbutil and press Enter Type List Instances and press Enter . You will receive a list of the instance name, both the LDAP and SSL port numbers, the location of the database, and its status.