Related Articles
Advanced Threat Analytics – Silent Installation “Adventure”
Well I love to automate things a lot using PowerShell – really I do! The success of automation depends on two major things. First there are the detailed requirements and secondly technical documentation of your stuff you want to automate. In reality, most projects do not cover both parameters in a satisfying way at all. […]
SCOM – Certificate Missing Enhanced Key Usage EventID 20050
If you want to monitor a server which does not belong to a domain you need to use a certificate, which has special requirements. You will find many posts how to handle SCOM certificates using a Microsoft PKI on the internet. An example is the detailed post from Tyson Paul. One of the essential requirements […]
E2EVC – Session “Business Process Automation – How it is done in a real world scenario”
Everyone talks these days about automation, services and self-service. Rarely you will find a session which is showing you a real world case showing how it is really done. I am happy to speak at the “Experts 2 Experts Virtualization Conference” in Lisbon together with my wingman Stefan Johner http://jhnr.ch/. The event takes place from […]