Five Questions with Juan Fernandez (CompTIA’s Council Leadership Award winner)

CompTIA’s Industry Advisory Council Leadership Award winner shares how he has achieved success by not being afraid to fail and learning from his mistakes. He now uses that experience to help other MSPs. It is not often that a CEO declares that his proudest moment in his career was… failure. Failure? Yup. Juan Fernandez isn’t your average business leader.
MSP Growth Coalition’s CEO and co-chair of CompTIA Channel Development Advisory Council, the CEO of MSP Growth Coalition has helped to build many companies and recently launched a new business to assist mid-sized MSPs in accelerating their success. All built on his mistakes and lessons learned over the years.
Fernandez has been a strong supporter of CompTIA’s members throughout all this. He was awarded the 2022 Industry Advisory Council Leadership Award for his outstanding service and dedication at this year’s CompTIA Communities & Councils forum. Fernandez spoke to CompTIA recently to share his story, including his priorities and what other MSPs can take from his experiences in order to achieve their own success. Here’s what Fernandez had to say.
What are you most proud about in your career? And what has helped you get to where you are today?
“Failure. My success has been built on failure for most of my life. CompTIA’s Communities & Councils form presented me with the statement, “Failure’ is the tuition we pay to succeed.” I needed that in my own life. It’s okay to fail. You can learn from your mistakes and move on.
“In addition, I would also say that writing the CompTIA A+ certification was a significant moment in my life. It’s because I can remember how I felt when the A+ failed early on. It wasn’t because I wasn’t competent enough, but because my studies weren’t thorough enough. My wife refused to let me give up. I knew I had the ability, but I had no choice but to unleash the imposter within me. Things started to happen when I did. I’m a first generation technologist so I was able to write the A+. This was something I was afraid of and never thought I would pass. It was also a significant accomplishment for me because it can make a difference in people’s lives. That’s what I’m most excited about.
What advice would you give MSPs and other tech companies to be more successful?
“Fail fast. The most important lesson is that you don’t know what works until it doesn’t. Think about playing chess. Although you may not always win, you can remember the last move that didn’t work and you won’t repeat it. Move fast, learn lessons. This has allowed me to create hyper-growth companies. Over the past 28 years, I have learned what to do. Don’t let the ‘thoughts of doing’ stop your from doing. Find what works, fail, stumble, laugh, cry, but get it done. You’ll either win or learn a lesson. If you learn a lesson, it’s possible to build meaningful relationships by sharing it. Last piece of advice: Successful companies have processes and procedures that enable people to succeed. You can create an amazing culture if you can instill it.
Why is being a member of the Channel Development Advisory Council important? What are your goals?
“One of my greatest desires is to empower others to succeed. I have witnessed a lot of conflict between vendors and partners in my journeys. I wanted to share some insights. It was important to hear the voices of the receiver side of the channel, not just the delivering, which is mostly vendors. This side of the story was not being represented and considered. MSPs receive a lot of what everyone thinks they want and need. We should be open to accepting it, sit still, and accept what is being told to us. I wanted to be heard.
“I wanted to represent MSP communities around the world. It was very important to me. It is still important today. I thought I would be kicked out as soon as I joined. I came in and was like, “Here’s what MSPs want.” Talk with channel partners, not channel partners. But I didn’t. We all work together for everyone’s benefit. Our goal is to empower channel partners and increase collaboration. I am working hard to remove barriers. There is no reason why we shouldn’t all be speaking. The council’s goal is to improve communication between internal and external parties, to learn how to interact and what the new motions are. All of us have to be there for our customers. That’s the ultimate goal.
What are the challenges/trends you would like to see more of in your council role?
“The problem is that we communicate with each other but don’t always want customers to know our intentions. Transparency is the key to success. It is important to recognize that distributors, vendors, and MSPs all need to be transparent.

Five ethical issues in technology to watch out for in 2021

There are many ethical issues that businesses face, especially when it comes technology. It is crucial to make critical decisions in order to protect privacy and use data correctly. What ethical issues will be most important in 2021 These are the top five. Business ethics is a hot topic. How we treat others, how we use information, interact with employees, manage our resources, approach sustainability and impact the world around you all have an impact on how we view companies. The way we treat people and the communities in which we live can make a difference in whether a business succeeds or fails. Businesses, even tech giants like Microsoft, often seek ethical decision-making and practices.
Today, businesses face many ethical challenges. It is crucial to make critical decisions to ensure that we are protecting individual freedoms and using data in an ethical manner. What ethical issues will be most important in 2021 These are the top five.
Missuse of Personal Information
The use of personal information by businesses is one of the most important ethical issues in today’s technologically enabled age. We are constantly sharing personal information online as we browse the internet, make online purchases, interact with businesses online, and engage in social media. Companies gather information to personalize our online experience. But, is this really a violation of our privacy rights?
According to the old saying, personal information is the new gold. Data has been commoditized because it offers businesses the opportunity to reach their consumers. But is it too much? It’s vital for businesses to know which products are being searched and what content is being consumed most. It’s crucial to know which legal or social issues are attracting the most attention for politicians. These valuable data points can be used to make money for businesses or organizations or to help them achieve their goals. Facebook has been criticized numerous times for selling the personal data it collects through its platform.
Deep Fakes and Misinformation
One thing that was evident in the 2016 and 2020 U.S. presidential election campaigns was the potential for misinformation to gain more support. This result created polarization which has had wide-reaching consequences on the global political and economic environments.
Contrary to how information was accessed before the internet, we are continuously flooded with news and events as they happen. Celebrities and politicians can share their opinions on social media, without having to verify them. The information is then aggregated and spread further, despite its accuracy or inaccuracy. Information is no longer subject to the same rigorous validation process as newspapers and books.
Similar to the above, we used believe that video told a truthful story. Deepfake technology allows for such sophisticated manipulations of digital imagery that people seem to be saying and doing things that have never occurred. This technology has the potential to cause identity theft and privacy invasion.
Inadequate oversight and acceptance of responsibility
A hybrid stack is a mix of owned and third-party technology. Most companies use this type of technology. There is often confusion about who is responsible for governance, big data use, cybersecurity concerns, and managing personally identifiable information (PII). Who is responsible for data security? Do you have any responsibility if credit card information is compromised if you use third-party software? It’s everyone’s responsibility. All stakeholders must share responsibility for the success of businesses.
Many experts also advocate for a global approach in governance. They argue that local policing results in fragmented policy making and widespread mismanagement of data. Similar to climate change, we must band together if we want to see improvements.
AI is used
Artificial intelligence has great potential for business. But when does AI systems cross the ethical line and become dangerous?
Facial recognition: The use of software to identify individuals can quickly become a problem. According to the NY Times there are many concerns about facial recognition. These include misuse, racial bias, and restriction of personal freedoms. The ability to track movements and activities quickly leads to a loss of privacy. Facial recognition is also not foo

5 Coding Bootcamp Stats that Have Us Excited for 2020

The cost-benefit ratios for college education are getting worse each year, but the results of coding bootcamps continue to improve.
Coding Dojo prides itself on producing the best results in the industry. We offer $76,500 starting salaries for grads, and up to 117% pay bumps for students who have only a high school education.
We are not the only ones experiencing positive momentum. The entire coding bootcamp ecosystem is producing incredible results.
Want proof? Course Report’s great minds have released the 2019 Alumni Outcomes & Demographics survey results.
These are five coding bootcamp stats that have got us excited for 2020.
1. 180% increase in the salary of low-income students

All grads experience a significant increase in their salary, but the best results are achieved where they are most needed. A coding bootcamp can help students who are low-income, which is usually defined as those whose family income falls below 125% of the federally set poverty level for their family size. This will increase their wages by 180% and lift them out of poverty in a matter a few months.
2. 35% of bootcampers, compared to 19% of computer science undergrads

When evaluating potential students, our main goal is not their GPA, extracurricular activities, or who their parents were. It’s about whether they have shown the drive and willingness to code. This philosophy has allowed us to surpass colleges in closing the gender gap in coding. Although we are not where we want, we are making progress.
3. 72% of students find work in less than 90 days — 20% more than before graduation

We would have to rethink all we do if this number was not working for students. Software Engineer (35%), Front-End Developer (13%), and Junior Web Developer (11%) are the most popular job titles. This is exactly how it should be.
4. Higher salaries are attained by bootcamps that are longer and more thorough.

One drawback of the bootcamp boom, however, is that it attracts companies that promise to transform students into developers in a matter of months. It’s not surprising that shorter bootcamps don’t offer the same starting salaries than more established programs. For example, 8-week bootcamp graduates had an average starting salary of $58,248 whereas those who completed our 14-week Coding Dojo program earned an average starting salary of $76,500.
5. 83% of grads apply the technical skills they have learned at their new job.

Ask any computer-science graduate how much of their 4-year college degree they actually use to become a programmer, and you’re likely going to get around 20%. Coding bootcamps remove the complexity of college programs and concentrate on the skills that you will use at work every day in a technical field.
Numbers don’t lie
A 14-week bootcamp will help you transform the next 30 years in your career. Coding Dojo alumni have improved their careers, salaries, and industries.
Apply now. It takes only two minutes.

5 Best Data Science Certifications For Beginners

Data science certifications can be obtained from many different sources. For beginners, it may seem daunting to navigate through all the options.
We have compiled the best data science certifications that will help you to accelerate your career in data science.
Data Science Certification: The Benefits
It is smart to choose to study data science as a career. Data science careers are the most in-demand today.
Data science jobs are on the rise because so many industries require data scientists.
According to the U.S. Bureau of Labor Statistics (USBoLS), the demand for data science skills will rise by a staggering 27.9% by 2026.
What are the benefits of getting a data science certification?
Join a fast-growing industry that has great potential for future growth
You have incredible career options
Competitive salaries in a variety industries

It’s time to start exploring your options now that you understand the value of certification. What are the best data science certifications available for beginners?
5 Best Data Science Certifications For Beginners
It can be difficult to choose the right subject matter to study. There are many options in this industry. You want to choose the right certificate for your career.
What are the basics of data science? First, you must know the cost and duration of the course.
It is also important to be aware of any prerequisites that you will need to meet. You should also know when and if certifications expire in order to keep up with the rapidly changing world of technology.
We compiled a list of the top data science certifications for beginners.
What are the top certifications in data science?
1. IBM Data Science Professional Certificate
Employers will be able to demonstrate that you are a data scientist and can use many machine learning and data science tools. These skills will help you in your data science career.
These tools will be useful in completing various projects and publishing reports for stakeholders.
You will be able to practice data science software such as Jupyter notebooks, and other tools that data scientists use while you study for this certification.
This certification will also teach you how to solve data science problems using the same key steps and methodology as professional data scientists.
What you’ll learn
Jupyter allows Python programming
Importing and cleaning data sets and analyzing data. Building data models and pipelines.
How to query databases using SQL
Data visualization tools that allow you to visually present data using Python
Machine learning algorithms and models

This certificate can be obtained by taking several courses. There are different costs for online data science bootcamps. A part-time course like this from edX costs $867.67
Coursera makes learning data science affordable. You can access courses for free, but you will need to pay for professional certificates.
Different organizations offer different courses that provide data science certifications to beginners.
Students who work or have other obligations during their studies can choose between full-time and part-time options.
Part-time options can take longer to complete. If you work 3-6 hours per day and take the edX course, you can finish the course in approximately a year.
There are many programs that are available from different organizations, each with different requirements. Some programs require prerequisites while others do not require any prior experience.
The IBM: Data Science Professional Certificate is currently in effect.
2. Microsoft Certified: Azure Data Scientist Associate Certification
The Microsoft Azure Data Scientist Associate Certificate will teach you computer science skills that enable you to use machine learning solutions at scale using Azure machine intelligence.
You will use your knowledge of Python and machine-learning to manage data preparation and ingestion, and create models for monitoring data in Microsoft Azure.
What you’ll learn
How to manage Azure resources for machine-learning
Running experiments and training models
How to implement responsible machine-learning and deep learning

This course is available at different prices depending on the organization. You can often find the course online through Microsoft depending on the time of the year and student demand.
While some courses are longer, others have a shorter duration. However, for those with an existing knowledge of Python or Azure Machine Learning, there’s a short 3-day training course at Microsoft in the training section online.
Students should be familiar with Python and machine learning frameworks.

5 Best Cybersecurity Certifications For Beginners

You probably know how fast things change if you are in cybersecurity or have studied the field. Cybersecurity and threats to systems, which were first discovered in the 1970s have been around since then.
As with any field that has been around for a long period of time, there have been many changes. This means that people in the field must keep up with new threats and attacks.
A cybersecurity certification can help with your ongoing learning.
There are many reasons to get a Cybersecurity certification
Like any job, it is important to continue learning and growing. You also need to stay on top of the latest trends in order to be successful. You can become a certified cybersecurity professional.
More money
You can easily land a job as a cybersecurity professional
Be qualified to perform specialized or senior-level roles

5 Best Cybersecurity Certifications For Beginners
1. CompTIA Security+
CompTIA Security+ certification is internationally recognized. It is the first security certification anyone in cybersecurity should get. It validates the competence and core knowledge of any candidate required in any cybersecurity position. This certification allows for an easy transition to intermediate-level cybersecurity jobs.
Top Certification Topics
Threats, attacks, and vulnerabilities
Governance, risk and compliance

Prerequisites for certification:

Cybersecurity job opportunities:
Systems Administrator
Security Analyst or Engineer
Analyst or Helpdesk Manager

2. Certified Ethical Hacker (CEH).
Cybersecurity is only possible through ethical hacking. It is crucial to understand how hackers can break through barriers and gain unauthorized entry to systems. This allows you to prevent attacks from happening in the first place.
A certification in ethical hacking will equip you with the skills and tools that you need to succeed in your cybersecurity career.
Top Certification Topics
Hacking web servers, applications, and wireless networks
Evading IDS, firewalls and honeypots
Cloud computing

Prerequisites for certification:
Two years of experience in Information Security work

Cybersecurity job opportunities:
Network Engineer
Junior Penetration Tester
Cybersecurity Consultant

3. GIAC Security Essentials (GSEC).
Giac Security Essentials Certification is for those who have more advanced knowledge than basic terminology and concepts in information security. This certification is awarded to individuals who have experience in IT systems roles related to security, such as cryptography, incident handling/response and contingency planning.
Top Certification Topics
Mobile device security
Endpoint security
Permission testing and vulnerability scanning

Prerequisites for certification:

Cybersecurity job opportunities:
Security Manager
Security Administrator
Forensic Analyst

4. (ISC.2 Security Certified Practitioner (SSCP).
The (ISC2)2 SSCP certification is intended for IT managers, directors, and network security specialists responsible for the security of their most valuable assets. This certification is not for everyone, so make sure you read the details before signing up.
If you work for government, SSCP meets the requirements of the US Department of Defense Directive. Although there are no prerequisites for this certification, we recommend it only for certain branches of cybersecurity careers.
Top Certification Topics
Administration and security operations
Monitoring, analysis, and identification of risk
Network and communications security

Prerequisites for certification:

Cybersecurity job opportunities:
Systems Engineer
Security Specialist
Database Administrator

5. Certified Information Security Manager (CISM).
The Certified Information Security Manager certification allows those with technical experience and technical expertise to move into a managerial position. This certification will demonstrate to others that you can align information security goals of the company with larger goals and your commitment to integrity, security, compliance, and security.
Top Certification Topics
Governance of information security
Incident management and risk management
Development of information security programs

Prerequisites for certification:
Five years of experience in professional information security management (within the last ten years).

2-3 years of experience in professional information security management (if these points are applicable to you).

Cybersecurity job opportunities:
Information Security Officer/Manager/Analyst
Security Architect
Chief Information (Security), Officer

Types of Cybersecurity Certification Programmes
There are three levels to cybersecurity programs:
Certificates in Cybersecurity Entry-Level
Intermediate Cybersecurity Certificate

Taking on PowerShell one cmdlet at a time

Share this post: This is part of an ongoing blog series by Adam Gordon. Adam will show you how to use each PowerShell command each week. Adam will be covering Get-Date this week.

When to use Get Date
The Get-Date cmdlet returns a DateTime object representing the current date or one you specify.
Get-Date formats the date and time in a variety of.NET and UNIX formats.
Get-Date can be used to generate a date/time character string and then send it to other cmdlets, or programs.
Get-Date uses your computer’s culture settings as a guide to format the output. To view your computer’s settings, use (Get-Culture).DateTimeFormat

How to use Get-Date
Find the current date and hour:
Get-Date displays current system time and date. The output can be found in both long-date and long-time formats.

Find elements of the current date/time:
Get-Date -DisplayHint Datum
Get-Date can be used to retrieve the date or the time element. The -DisplayHint parameter accepts the arguments Date, Time or DateTime.

Use a.NET format specifier to get the date and time
Get-Date -Format “dddd MM/dd/yyyy HH:mm K”
Get-Date uses a -Format parameter in order to specify multiple.NET format specifiers. The output is a String object.
These are the.NET format specifiers that were used in this example:
SpecifierDefinitionddddDay of the week – full nameMMMonth numberddDay of the month – 2 digitsyyyyYear in 4-digit formatHH:mmTime in 24-hour format -no secondsKTime zone offset from Universal Time Coordinate (UTC)
Click here to find out more about the.NET format specifiers.

Use a UFormat specifier to get the date and time
Get-Date -UFormat “%A %m/%d/%Y %R %Z”
Get-Date uses a -UFormat parameter for specifying several format specifiers. The output is a String object.
These are the UFormat format specifiers that were used in this example:
SpecifierDefinition%ADay of the week – full name%mMonth number%dDay of the month – 2 digits%YYear in 4-digit format%RTime in 24-hour format -no seconds%ZTime zone offset from Universal Time Coordinate (UTC)

Find a date’s year-end:
(Get-Date -Year 2020 -Month 12 -Day 31).DayOfYear
Get-Date uses three parameters for the date: Year (Month), and Day (Day). The command is enclosed in parentheses to allow the DayofYear property to evaluate it.
NOTE: The Gregorian Calendar has 365 days, with the exception of leap years which have 366. December 31, 2020 is day 366.

You can check if a date has been adjusted for daylight saving time:
$DST = Get-Date$DST.IsDaylightSavingTime()
This example uses a simple boolean method that checks if a date has been adjusted by daylight saving time. Variable $DST stores the Get-Date result.
$DST uses IsDaylightSavingTime to determine if the date has been adjusted for daylight saving time.

Convert the current time into UTC time
Get-Date -UFormat “%A %B/%d/%Y %T %Z”$Time = Get-Date$Time.ToUniversalTime()
In this example, the current hour is converted into UTC time. To convert the time, the UTC offset is used for the system’s location.
Get-Date uses a -UFormat parameter and format specifiers to display current system date/time. The UTC offset for -07 is represented by the format specifier %Z.
The $Time variable stores current system date and times. $Time uses ToUniversalTime() to convert time based on the computer’s UTC offset.

Create a timestamp
$timestamp = Get-Date -Format o | ForEach-Object $_ -replace “:”, “.” New-Item -Path C:\Test\$timestamp -Type Directory
This example shows how a format specifier creates an object called timestamp String for a directory name. The timestamp contains the date, time and UTC offset.
The $timestamp variable stores results from a Get-Date operation. Format is used by Get-Date to create a timestamp string object.
The object is sent to ForEachObject via the pipeline. A ScriptBlock is the $_ variable that represents current pipeline object. The timestamp string can be delimited using colons, which are then replaced by periods.
New-Item uses Path to specify the location of a new directory. The directory name is specified by the $timestamp variable in the path. The -Type parameter indicates that a directory has been created.

Do you need PowerShell training? ITProTV offers PowerShell online IT training courses.

Taking on PowerShell one cmdlet at a time

Share this post: This is part of an ongoing blog series by Adam Gordon. Adam will show you how to use each PowerShell command each week. Adam will be covering Get-Culture this week.

When to use Get Culture
Get-Culture gives information about current culture settings. This includes information about the current language settings of the system, such the keyboard layout and the display format for items such as numbers and currency.
You can also use Get-UICulture cmdlet to get the current user interface culture and the Set-Culture kmdlet in International module.
The user-interface culture (UI) determines which text strings will be used for user interface elements such as menus and messages.

How to Use Get-Culture
Culture settings:
Get-Culture provides information about the regional settings of the computer.

Format the properties of a cultural object:
Get-Culture | Format-List -Property *
Displays all properties of the culture object. ) to send the culture object to the Format-List cmdlet. It uses the –Property parameter in order to display all (*), properties of the object. FL *

The remaining commands examine the properties of the culture object using dot notation to display their values. This notation can be used to display any property of an object.

Many object properties have properties.

To display the value for the AbreviatedDayNames property in the DateTimeFormat property, you can use dot notation

Do you need PowerShell training? ITProTV offers PowerShell online IT training courses.

Taking on PowerShell one cmdlet at a time

Share this post:This blog post is part of an ongoing series by Adam Gordon. Adam will show you how to use each PowerShell command each week. Adam will be covering Get-Credential this week.

When to use Get Credit
Anytime you need a credential object that is based on a username and password.
An authentication dialog box will prompt the user by default. You can prompt the user at command line with some host programs, such the PowerShell console.
How to use Get Credit
These commands use a credential object returned by the Get-Credential cmdlet to authenticate remote users so they can use Windows Management Instrumentation to manage the computer.
$c = Get-Credential
Get-WmiObject Win32_DiskDrive -ComputerName Server01 -Credential $c
The first command creates a credential object, and saves it in $c.
The second command uses credential objects in Get-WmiObject commands. This command provides information about the disk drives of the Server01 computer.

This command uses PromptForCredential to prompt the user to enter their password and user name. The $Credential variable is saved with the credentials.
$Credential = $host.ui.PromptForCredential(“Need credentials”, “Please enter your user name and password.”, “”, “NetBiosUserName”)
Alternative to the Get-Credential cmdlet, the PromptForCredential method can be used. PromptForCredential allows you to specify the caption, messages and user name that will appear in the message box.

This example shows how to modify a registry so that the user is prompted at a command line instead of using a dialog box.
Set-ItemProperty “HKLM:\SOFTWARE\Microsoft\PowerShell\1\ShellIds” -Name ConsolePrompting -Value $true
This command creates the ConsolePrompting registry record and sets its value as True. This command can be run by starting PowerShell using the “Run As Administrator” option.
To use a dialog box to prompt, set the value for the ConsolePrompting property to false ($false), or use the Remove – ItemProperty cmdlet.

Do you need PowerShell training? ITProTV offers PowerShell online IT training courses.

Taking on PowerShell one cmdlet at a time

Share this post:This blog post is part of an ongoing series by Adam Gordon. Adam will show you how to use each PowerShell command each week. Adam will be covering Get-Counter this week.

When should you use Get-Counter
The Get-Counter cmdlet retrieves performance counter data directly from performance monitoring instruments in Windows operating systems. Get-Counter retrieves performance data from either a local or remote computer.
The Get-Counter parameters can be used to specify one or several computers, list the performance count sets and the instances within them, set the sample intervals and specify the maximum number. Get-Counter does not require parameters to retrieve performance counter data for a given set of system counters.
Access control lists (ACL) protect many counter sets. Open PowerShell and select the Run as administrator option to see all counter sets.
What version of PowerShell should I use for this blog?
Get the PowerShell Version for your machine
This command displays the PowerShell version information for your machine.

How to use Get-Counter
Modules can be imported into the current session
Get-Counter uses a -ListSet parameter with an (*) to get a list of counter sets. The dot (.). The local computer is represented by the dot (.) in the MachineName column.

Please specify the SampleInterval & MaxSamples.
Get-Counter -Counter “\Processor(_Total)\% Processor Time” -SampleInterval 2 -MaxSamples 3
Get-Counter uses Counter to specify the counter path: Processor(_Total), % Processor Time.
The SampleInterval parameter specifies a two-second interval for checking the counter.
MaxSamples determined that the maximum number of times you can check the counter is three.

List alphabetical of counter sets:
Sort-Object -Property CounterSetName
Get-Counter uses a -ListSet parameter with an * (*), to obtain a complete list. The CounterSet objects are sent to the pipeline.
Sort-Object uses -Property to specify that objects are sorted using CounterSetName.
The objects are sent to Format-Table via the pipeline. The -AutoSize parameter adjusts column widths to minimize truncation.
The dot (..) in the MachineName column represents the local computer. The local computer is represented by the dot (.) in the MachineName column.

To get counter data, you can do a background job:
Start-Job -ScriptBlock Get-Counter -Counter “\LogicalDisk(_Total)\% Free Space” -MaxSamples 1000
Start-Job uses a -ScriptBlock parameter in order to run a GetCounter command.
Get-Counter uses the -Counter parameter to specify the counter path \LogicalDisk(_Total)\% Free Space.
The -MaxSamples parameter allows you to obtain 1000 samples of the counter.
** To see the performance counter output for the job, use Receive-Job cmdlet.

Multiple computers can provide counter data:
$DiskReads = “\LogicalDisk(C:)\Disk Reads/sec”
$DiskReads | Get-Counter -ComputerName SCCMSSPRIME, SCCMDC -MaxSamples 10
The $DiskReads variable stores the \LogicalDisk(C:)\Disk Reads/sec counter path.
The $DiskReads variable goes down the pipeline to Get-Counter. Counter is the first position parameter. It accepts the $DiskReads path.
-ComputerName indicates the two computers, and -MaxSamples specifies how many samples each computer will produce.

Each counter in a counter-set should have a single value
$MemCounters = (Get-Counter -ListSet Memory).Paths
Get-Counter -Counter $MemCounters
Get-Counter uses -ListSet to specify the Memory counter set.
The command is enclosed within parentheses to ensure that the Paths property returns each path in string form.
The $MemCounters variable stores the paths. Get-Counter uses a parameter called -Counter to specify counter paths in the $MemCounters variables.

Get-InstalledModule – Last week’s command
Do you need PowerShell training? ITProTV offers PowerShell online IT training courses.

Taking on PowerShell one cmdlet at a time

Share this post: This is part of an ongoing blog series by Adam Gordon. Adam will show you how to use each PowerShell command each week. Adam will be covering Get-Content this week.

When should you use Get-Content
The Get-Content cmdlet retrieves the content at the specified location, such as text in a file or content of a function.
Files are read one line at time. This returns a list of objects that each represent a line of content.
PowerShell 3.0’s Get-Content allows you to get a specific number of lines starting at the beginning or ending of an item.
What version of PowerShell should I use for this blog?
Get the PowerShell Version for your machine
This command displays the PowerShell version information for your machine.

How to use Get Content?
Get the text content of a file:
ForEach-Object Add-Content -Path .\LineNumbers.txt -Value “This is line $_.”
Line # 2: Get Content – Path.LineNumbers.txt
This example shows the contents of a file in the current director. LineNumbers.txt contains 100 lines according to the format “This is Line X”.
Line # 1 – The array values 1-100 are sent along the pipeline to ForEach-Object cmdlet. To create the LineNumbers.txt files, ForEach-Object uses a scriptblock with the Add-Content cmdlet. As each object is sent down the pipeline, the variable $_ records the array values.

Line #2 – The Get Content cmdlet uses a -Path parameter for the LineNumbers.txt text file. It then displays the content in PowerShell’s console.

Limit the number lines that can be returned with Get-Content returns
Get-Content -Path .\LineNumbers.txt -TotalCount 5
The -TotalCount parameter can be used to retrieve the first five lines.

You can get a specific line from a text file.
(Get-Content -Path .\LineNumbers.txt -TotalCount 25)[-1]
The first 25 lines of content are automatically included in the -TotalCount parameter.
The Get-Content command must be enclosed in parentheses to ensure that it completes before moving on to the next step.
Get-Content returns an array with lines. This allows you to add the index note after the parenthesis to retrieve a specific number. In this example, the [-1] index indicates the last index in the returned array with 25 lines.
Find the last line in a text file
Get-Item -Path .\LineNumbers.txt | Get-Content -Tail 1
This example shows that you can pipe files into Get-Content cmdlet. The -Tail parameter retrieves the last line of the file. This method is faster than using the [-1] index notation to retrieve all lines.

Get the content of an alternative data stream:
Line #1: Set-Content-Path.Stream.txt-Value “This is the content for the Stream.txt files’
Line #2: Get-Item-Path.Stream.txt-Stream *
Line #3: Get-Content-Path.Stream.txt-Stream $DATA
Line #4: Add-Content. -Path.Stream.txt. Stream NewStream. -Value “Added a stream named NewStream into Stream.txt.”
Line # 5: Get -Item.Stream.txt-Stream *
Line # 6: Get Content -Path.Stream.txt-Stream NewStream
Line #1: The Set-Content cmdlet can be used to create sample content within a file called Stream.txt.

Line #2 specifies a wildcard for the -Stream parameter that will display all streams in the newly created file.

Line 3 retrieves $DATA stream content.

Line #4 uses the -Stream parameter in Add-Content for creating a new stream containing sample content.

Line #5 uses Get-Item for verification that the stream was created.
Line 6 retrieves the content from your newly created Stream.

This example shows how to use -Stream to retrieve alternate data streams for files stored on a Windows NTFS volume.
The dynamic parameter -Stream is part of the FileSystem provider. Get-Content retrieves data only from the $DATA stream or primary stream by default. Hidden data like attributes, security settings, and other data can be stored in streams.
Use filters with Get-Content
Get-Content -Path C:\Windows\temp\* -Filter *.log
To indicate the path’s contents, you must include a trailing asterisk (“*”) when using filters to qualify -Path.

Learn the command for last week: Get-Counter
Do you need PowerShell training? ITProTV offers PowerShell online IT training courses.