PowerShell for Windows Admins:

May, 2012


May 8, 2012  12:00 PM

UK PowerShell Group–May 2012



Posted by: Richard Siddaway
PowerShell 3, User Group

 


When: Tuesday, May 29, 2012 7:30 PM (BST)


Where: Virtual

*~*~*~*~*~*~*~*~*~*

This is the second of two meetings dealing with the new PowerShell functionality in Windows Server 8

Notes


Richard Siddaway has invited you to...

May 7, 2012  10:31 AM

Scripting Games 2012 comments: #14 local computer name



Posted by: Richard Siddaway
PowerShell

There are a number of ways to pass the names of the local machine into a script or function:

  • use the actual name
  • use the IP address (if the processing in the script can work with IP addresses)
  • use 127.0.0.1 – the loop back address (if the processing in...


May 6, 2012  8:00 AM

Scripting Games 2012 comments: #13 Default Printer



Posted by: Richard Siddaway
PowerShell, WMI

In one of the events you had to find the default printer. This can be done using WMI.

The full list of printers can seen using:

Get-WmiObject -Class Win32_Printer

 

If you want to examine the printer objecy – to determine what information is available -...


May 5, 2012  12:50 PM

Scripting Games 2012 comments: #12 date conversions



Posted by: Richard Siddaway
PowerShell, WMI

 

A few times in the games you were asked for date time based information. Now WMI has a lot of classes that return WMI information. It is in an awkward format though

PS> Get-WmiObject -Class Win32_OperatingSystem | fl *time*


CurrentTimeZone : 60


May 5, 2012  7:55 AM

Scripting Games 2012 comments: #11–its true



Posted by: Richard Siddaway
PowerShell

The games are over for another year. The number of entries was huge – 150% increase over last year. Congratulations to the winners and to everyone who took part.

One thing I noticed was the number of scripts that made testing booleans harder than it needed to be.

A boolean can...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: