This article by Sherif Talaat, the author of Windows PowerShell 4.0 for .NET Developers, demonstrates both simple and advanced examples of how to make use of PowerShell integration with technologies such as .NET, WMI, CIM, and COM.
In this article, we will cover the following topics:
- The basics of WMI, CIM, COM, and XML
- Extending Windows PowerShell capabilities with .NET, COM, and XML
Las tecnologías de Inteligencia de Negocios son parte fundamental de un negocio ya que apoyan el proceso de toma de decisiones con información clave y permiten a las empresas mantenerse alineados con la constante evolución de los mercados. La tecnología disruptiva de QlikView hace de éste un líder en la industria; con su flexibilidad y plataforma de análisis altamente poderosa, la construcción de aplicaciones QlikView está al alcance tanto de usuarios de negocio como de desarrolladores.
En este artículo por Miguel Ángel García y Barry Harmsen, autores de QlikView 11 para Desarrolladores, veremos:
- Qué es QlikView.
- Cómo explorar datos con QlikView.
- La tecnología y componentes detrás de QlikView.
- Aerolíneas HighCloud, y porqué QlikView puede ser justo la herramienta que necesitan.
In this article by Jochen Nickel, author of Learning Microsoft Windows Server 2012 Dynamic Access Control, we will have a look at the Microsoft DAC 2012, which is an end-to-end file server solution. We will have a look at the main components of Dynamic Access Control (DAC) for better granular overview.Read Microsoft DAC 2012 in full
This article, created by Farhan Ahmed Nadeem and Prasenjit Sarkar, the authors of Implementing Cisco UCS Solutions, introduces identity and resource pools which include UUID, MAC addresses, WWN, and server pools.
The list of topics that will be covered in the article is as follows:
- Understanding identity and resource pools
- Learning to create a UUID pool
- Learning to create a MAC pool
- Learning to create a WWNN pool
- Learning to create a WWPN pool
- Understanding the server pool
- Learning to create server pool membership and qualification policies
This article by Faisal Ghadially and Kalpit Parikh, the authors of Oracle Fusion Applications Administration Essentials, provides an architectural overview and an introduction to the technical components of Oracle Fusion Applications.Read Getting Started with Fusion Applications in full
This article, by Chandrasekhar Mankala and Ganesh Mahadevan V., the authors of the book SAP HANA Cookbook, highlights the SAP HANA architecture and its features.Read SAP HANA Architecture in full
This article written by Paul te Braak, the author of the book Microsoft Tabular Modeling Cookbook, focuses on the complex modeling concepts such as:
- Grouping by binning and sorting with ranks
- Defining many-to-many relationships
- Using the last non-empty function for stock data
In this article, by Nelson Enriquez and Samundar Singh Rathore, authors of Discovering Business Intelligence Using MicroStrategy 9, we cover the procedures to share reports and the subscription engine.Read Sharing Your BI Reports and Dashboards in full
This article by Bhanu Birani, author of Getting Started with Flurry Analytics, covers tracking an application and its specific sections as goals to generate detailed reports using Flurry. As your goals will vary depending on your requirements for the data you want to gather from your application. So Flurry provides you with a way to track all your events using your event ID.Read Settings goals in full
In this article by Jason Ventresco, the author of the book VMware Horizon View 5.3 Design Patterns and Best Practices, has explained the storage-related features of View.
View includes two specific features that influence storage design and View infrastructure. One is View Storage Accelerator and the other is tiered storage for View linked clone desktops. This article will go into further detail about each of these features.Read Understanding View storage-related features in full