Taking on PowerShell one cmdlet at a time

Share this post:This blog post is part of an ongoing series by Adam Gordon. Adam will show you how to use each PowerShell command each week. Adam will be covering Get-Counter this week.

When should you use Get-Counter
The Get-Counter cmdlet retrieves performance counter data directly from performance monitoring instruments in Windows operating systems. Get-Counter retrieves performance data from either a local or remote computer.
The Get-Counter parameters can be used to specify one or several computers, list the performance count sets and the instances within them, set the sample intervals and specify the maximum number. Get-Counter does not require parameters to retrieve performance counter data for a given set of system counters.
Access control lists (ACL) protect many counter sets. Open PowerShell and select the Run as administrator option to see all counter sets.
What version of PowerShell should I use for this blog?
Get the PowerShell Version for your machine
$PSVersionTable
This command displays the PowerShell version information for your machine.

How to use Get-Counter
Modules can be imported into the current session
FT
Get-Counter uses a -ListSet parameter with an (*) to get a list of counter sets. The dot (.). The local computer is represented by the dot (.) in the MachineName column.

Please specify the SampleInterval & MaxSamples.
Get-Counter -Counter “\Processor(_Total)\% Processor Time” -SampleInterval 2 -MaxSamples 3
Get-Counter uses Counter to specify the counter path: Processor(_Total), % Processor Time.
The SampleInterval parameter specifies a two-second interval for checking the counter.
MaxSamples determined that the maximum number of times you can check the counter is three.

List alphabetical of counter sets:
Sort-Object -Property CounterSetName
Get-Counter uses a -ListSet parameter with an * (*), to obtain a complete list. The CounterSet objects are sent to the pipeline.
Sort-Object uses -Property to specify that objects are sorted using CounterSetName.
The objects are sent to Format-Table via the pipeline. The -AutoSize parameter adjusts column widths to minimize truncation.
The dot (..) in the MachineName column represents the local computer. The local computer is represented by the dot (.) in the MachineName column.

To get counter data, you can do a background job:
Start-Job -ScriptBlock Get-Counter -Counter “\LogicalDisk(_Total)\% Free Space” -MaxSamples 1000
Start-Job uses a -ScriptBlock parameter in order to run a GetCounter command.
Get-Counter uses the -Counter parameter to specify the counter path \LogicalDisk(_Total)\% Free Space.
The -MaxSamples parameter allows you to obtain 1000 samples of the counter.
** To see the performance counter output for the job, use Receive-Job cmdlet.

Multiple computers can provide counter data:
$DiskReads = “\LogicalDisk(C:)\Disk Reads/sec”
$DiskReads | Get-Counter -ComputerName SCCMSSPRIME, SCCMDC -MaxSamples 10
The $DiskReads variable stores the \LogicalDisk(C:)\Disk Reads/sec counter path.
The $DiskReads variable goes down the pipeline to Get-Counter. Counter is the first position parameter. It accepts the $DiskReads path.
-ComputerName indicates the two computers, and -MaxSamples specifies how many samples each computer will produce.

Each counter in a counter-set should have a single value
$MemCounters = (Get-Counter -ListSet Memory).Paths
Get-Counter -Counter $MemCounters
Get-Counter uses -ListSet to specify the Memory counter set.
The command is enclosed within parentheses to ensure that the Paths property returns each path in string form.
The $MemCounters variable stores the paths. Get-Counter uses a parameter called -Counter to specify counter paths in the $MemCounters variables.

Get-InstalledModule – Last week’s command
Do you need PowerShell training? ITProTV offers PowerShell online IT training courses.

Taking on PowerShell one cmdlet at a time

Share this post: This is part of an ongoing blog series by Adam Gordon. Adam will show you how to use each PowerShell command each week. Adam will be covering Get-Content this week.

When should you use Get-Content
The Get-Content cmdlet retrieves the content at the specified location, such as text in a file or content of a function.
Files are read one line at time. This returns a list of objects that each represent a line of content.
PowerShell 3.0’s Get-Content allows you to get a specific number of lines starting at the beginning or ending of an item.
What version of PowerShell should I use for this blog?
Get the PowerShell Version for your machine
$PSVersionTable
This command displays the PowerShell version information for your machine.

How to use Get Content?
Get the text content of a file:
ForEach-Object Add-Content -Path .\LineNumbers.txt -Value “This is line $_.”
Line # 2: Get Content – Path.LineNumbers.txt
This example shows the contents of a file in the current director. LineNumbers.txt contains 100 lines according to the format “This is Line X”.
Line # 1 – The array values 1-100 are sent along the pipeline to ForEach-Object cmdlet. To create the LineNumbers.txt files, ForEach-Object uses a scriptblock with the Add-Content cmdlet. As each object is sent down the pipeline, the variable $_ records the array values.

Line #2 – The Get Content cmdlet uses a -Path parameter for the LineNumbers.txt text file. It then displays the content in PowerShell’s console.

Limit the number lines that can be returned with Get-Content returns
Get-Content -Path .\LineNumbers.txt -TotalCount 5
The -TotalCount parameter can be used to retrieve the first five lines.

You can get a specific line from a text file.
(Get-Content -Path .\LineNumbers.txt -TotalCount 25)[-1]
The first 25 lines of content are automatically included in the -TotalCount parameter.
The Get-Content command must be enclosed in parentheses to ensure that it completes before moving on to the next step.
Get-Content returns an array with lines. This allows you to add the index note after the parenthesis to retrieve a specific number. In this example, the [-1] index indicates the last index in the returned array with 25 lines.
Find the last line in a text file
Get-Item -Path .\LineNumbers.txt | Get-Content -Tail 1
This example shows that you can pipe files into Get-Content cmdlet. The -Tail parameter retrieves the last line of the file. This method is faster than using the [-1] index notation to retrieve all lines.

Get the content of an alternative data stream:
Line #1: Set-Content-Path.Stream.txt-Value “This is the content for the Stream.txt files’
Line #2: Get-Item-Path.Stream.txt-Stream *
Line #3: Get-Content-Path.Stream.txt-Stream $DATA
Line #4: Add-Content. -Path.Stream.txt. Stream NewStream. -Value “Added a stream named NewStream into Stream.txt.”
Line # 5: Get -Item.Stream.txt-Stream *
Line # 6: Get Content -Path.Stream.txt-Stream NewStream
Line #1: The Set-Content cmdlet can be used to create sample content within a file called Stream.txt.

Line #2 specifies a wildcard for the -Stream parameter that will display all streams in the newly created file.

Line 3 retrieves $DATA stream content.

Line #4 uses the -Stream parameter in Add-Content for creating a new stream containing sample content.

Line #5 uses Get-Item for verification that the stream was created.
Line 6 retrieves the content from your newly created Stream.

This example shows how to use -Stream to retrieve alternate data streams for files stored on a Windows NTFS volume.
The dynamic parameter -Stream is part of the FileSystem provider. Get-Content retrieves data only from the $DATA stream or primary stream by default. Hidden data like attributes, security settings, and other data can be stored in streams.
Use filters with Get-Content
Get-Content -Path C:\Windows\temp\* -Filter *.log
To indicate the path’s contents, you must include a trailing asterisk (“*”) when using filters to qualify -Path.

Learn the command for last week: Get-Counter
Do you need PowerShell training? ITProTV offers PowerShell online IT training courses.

Apple: IOS and MacOS updates

We have learned that Apple has released the first major updates to iOS and macOS. This is what’s worth discussing!
iOS 10.1 contains many enhancements and bug fixes. But the unique appendage is Portrait Camera. This feature was previously only available for iPhone 7 Plus.
Portrait Camera uses the dual cameras on the iPhone 7 Plus to create a depth of field effect that puts the foreground in sharp focus while blurring the background.
It is well-known that iOS 10.1 introduces this feature as a beta. This move Apple has used previously, exclusively with its Maps, in order to excuse the initial results, gather data from users and slowly improve the underlying software.
According to the most reliable sources, Apple has also fixed 13 security flaws in iOS 10.1.
Apple launched iOS 10 on September 13. The operating system is expected to run on iPhone 5 and later and iPad Pro, iPad Air, iPad Air and later and iPad Mini 2 and later and the fifth-generation iPod Touch.
In the meantime, macOS Sierra 10.2.1 fixes 16 vulnerabilities and addresses other non-security issues. The latter include a compatibility enhancement with Microsoft Office and a fix for a Mail updating problem.
Sierra runs on all Macs sold between 2009-2010, and later. It was released to the Mac App Store on September 20.
Computerworld originally published this article.

Apple and IBM: It’s Time to Transform Education With Watson Element!

This is great news! Apple and IBM have launched their first iOS app for academia this week. It was a significant step forward that they set themselves the task to combine student data with cognitive technology and curriculum to improve and enhance personalized education for students in K-12. The IBM Watson Element for Educators has finally made this possible.
Apple and IBM teamed up in a new way of astonishing customers and clients. IBM Watson Element for Educators is a new iPad app that provides teachers with a more comprehensive view of students’ academic progress and achievements, progress, interests, learning activities, and learning activities in grades k-12. The initiative was initiated by IBM in 2013. Its development was accelerated by Apple’s 2014 partnership. MobileFirst for iOS was created.
According to Chalapathy Neti (Vice President of Education Innovation for IBM Watson), it was crucial for the companies that they reconstruct the educational experience for students and teachers by combining IBM data, analytics, cognitive computing and IBM data with Apple’s design, user experience and design.
According to Neti, Watson, IBM’s cognitive tech, pulls data from three classes to align curriculum with students’ interests and proficiencies. Neti states that IBM Watson Element for Educators records students’ behaviors and interests to give insight into their proficiencies and determine the type of personalized content and learning environments they will be most interested in, according to Neti.
This app may be viewed as a system of record by some readers. It’s actually a portal that teachers can use to access, manage, and gain insights from a variety of data sets. The application can use data from different systems. This is common with most school districts, such as the Coppell Independent Schools District (ISD), Texas, which was the first to use Watson Element.
Apple and IBM have collaborated to integrate relevant data into the app. This is expected to help educators track students’ learning and make observations about their learning preferences. In the end, personalized plans will be created that improve over time.
Watson Element is being used by approximately 150 teachers in four schools within Coppell ISD at the moment. The district plans to have all its teachers using the app by next year. Teachers have been using iPads for approximately three years. This is why some iOS apps and the tablet are now a part of their daily routine for lesson design.
Teachers can also incorporate training programs or other published material as well as lesson plans and textbooks to further customize their district’s instance of Watson Element.
The new iPad app was created by Apple and IBM. It is available to educators at a per year, per student price. There is also a one-time setup fee that includes integration with existing programs, databases, and technologies in school districts.
CIO originally published this article.

Another type of virus

[Reading Time – 6 minutes and 8 seconds]
It’s difficult to think of anything else right now than the coronavirus. We shouldn’t. However, we can see how this virus is similar with another type of virus: namely, computer malware viruses.
The Word “Virus”
The Latin word for virus, which we use in English, is derived from a Latin word that means “slimy liquid poison or poisonous secretion” and was first used in late Middle English to describe the venom of a serpent. In medieval times, it was used to refer to the discharge from a wound or ulcer. The term “virus” was then extended to describe the bodily substances that cause the infectious diseases. Edward Jenner published in 1799 his discovery that the “cowpox virus” could be used to prevent smallpox.
As biological science progressed, the term “virus” became more precise to describe tiny infectious agents that replicate in living cells. Electronic microscopes enabled scientists to see viruses for their first time in the 1930s. This was the beginning of the new field of “virology”. Since then, scientists have continued to identify new biological viruses and to name them. In 1968, the journal Nature published the first widespread report on coronaviruses. They are named so because the fringe around the virus, when seen through an electron microscope, resembles the corona from the sun.
A biological virus, such as COVID-19, is an agent that reproduces within a cell. A virus infects a cell and takes control of its operation, making it a virtual factory that can make more copies. The virus forces the cell to make thousands, if not hundreds of thousands, of identical copies of its original virus very quickly. For example, the polio virus can create more than one million copies within one infected human cell. Biologists often claim that viruses exist to create more viruses.
The virus that causes the disease is a major concern in today’s world. The virus has been named by the International Committee on Taxonomy of Viruses “SARS-CoV-2”, which stands for severe acute respiratory syndrome coronavirus 2. The World Health Organization has named the virus-related disease “COVID-19” (short for coronavirus disease 2019).
Let’s now turn our attention to computer viruses.
A computer virus is malicious code that reproduces on the same computer as its biological counterpart. A computer virus is a malicious computer code that reproduces itself (or an evolved copy) without human intervention.
Computer viruses: A little history
David Gerrold, a science-fiction author, wrote “When HARLIE was One” in 1972. This novel imagined a computer virus program that replicated itself just like biological viruses. In 1982, the Apple II was infected with one of the first viruses. Rich Skrenta, a ninth grade student from Pittsburgh, wrote “Elk Cloner,” a poem that displayed on the screen after 50 consecutive uses of infected floppy drives. Unfortunately, the virus spread and got onto Skrenta’s computer. Dr. Frederick Cohen, a mathematician, introduced the term “computervirus” two years later. He used a recommendation by his advisor and came up with the name after reading Gerrold’s science fiction novel.
Computer viruses can infect almost all computers by inserting themselves into computer files, either executable program files or user-created data files. A program virus is a virus that infects executable program files. The virus activates when the program is launched. A virus can also be part a data file. A macro virus is the most common. It is a collection of instructions that can be combined into a single command. Macros are often used to automate complex tasks or repeating tasks. The macro instructions will execute once the document has been opened.
Computer viruses were first to attach or append themselves to infected files. The virus then added a jump instruction to the file’s beginning. This instructed it to point to the file’s end, which is where the virus code is located. The jump instruction directed control to the virus when the program was launched. These types of viruses can be detected by virus scanners fairly easily. Viruses today are so sophisticated that they can be difficult to detect.
They are so ugly! How can we get rid of them! Let’s take a look at COVID-19, and then combine it with computer terminology and computer virus.
How can we rid ourselves of viruses?
All attempts to eradicate viruses (called “viral therapy”) face a fundamental challenge. Most viruses only have a few genes. They rely on proteins in the cells infected (called the “host cell”) to perform many of their functions.

Another reason to get CompTIA Mobility+ is Fiberlink – CompTIA Dual

Breaking News! CompTIA Mobility+ Certification is now part of a new dual certification program from Fiberlink, an IBM Company. Mobility+ is now a prerequisite to Fiberlink’s MaaS360 Partner Academy.
CompTIA’s Mobility+ certification, which was launched recently, has quickly gained popularity due to the rising demand for mobile apps development and the growing trend in mobile technologies. This week, however, mobility professionals and wannabes have another reason to continue with this credential.
CompTIA has partnered with Fiberlink, an IBM company that is a leader in enterprise mobility management (EMM). Fiberlink has announced a new partner certification, the MaaS360 Partnership Certification Program. CompTIA Mobility+ certification is required to participate in this program. Anyone wishing to join the MaaS360 Partner Academy should first obtain the CompTIA Mobility+ certification.
The winning combination of CompTIA Mobility+ & the MaaS360 Partner Academie optimizes the holder’s mobility proficiency to drive new possibilities and effectively manage, secure and design any mobile environment.
Fiberlink praised CompTIA Mobility+ certification as being very well designed for candidates to master smooth mobility services delivery and technical skills. Francois Daumard (Vice President of Channels at Fiberlink), stated that by adding their own content to Mobility+, we know our partners will be well-equipped for success in this space.”
Terry Erdle, CompTIA’s executive vice president for certification and learning, stated that this is exactly the role CompTIA certifications are designed to fill. “This is exactly what CompTIA certifications are meant to do; to provide IT professionals solid, foundational skills that can be used as a steppingstone to more specialized, vendor specific credentials.” “We are delighted to work with Fiberlink in their efforts to train and credential channel partners.”
Launched in November 2013, CompTIA Mobility+ is an industry-built, internationally-recognized certification that covers the knowledge and skills IT professionals need to deploy, integrate, manage and secure mobile devices and platforms to optimize performance and mitigate risks and threats. Click here to learn more about CompTIA Mobility+ Certification. Learn more about Fiberlink and its programs.

Android Certifications and Exams: Review

Android(tm), ATC allows IT professionals to take online exams through its partners and Pearson VUE testing centers. Candidates who want to earn an Android certification can only take Android ATC exams at authorized training centers and any Pearson VUE authorized testing centre around the globe.
Below is a list of all the exams:
Android ATC Certified Trainer Training Skills (AND-400).
Android Application Development (AND-401)
Monetize Android Applications (AND-403)
Android Security Essentials (AND-402)
How can I prepare to take an exam?
There are many ways to prepare for the Android exams and get certified. You are advised to use the online self-study guides found at the following link. However, self-trainings alone are not enough. Special Android training courses are available to help you prepare for the exams. Please use the following form to locate a training centre near you.
Although the certification exams can be difficult, you don’t have to worry about it. You just need to practice a lot and regularly review the material. Let’s now look at the actual exams.
AND-400: Android ATC Certified Trainer Exam
This exam is used to verify communication and training skills. This exam is for you if your immediate goal is to become a certified trainer. It has 45 multiple-choice questions and a 70% passing rate. Questions include the E-Book content, as well as simple IQ questions (Multiple Choice). If you read the E-Book, it will be easy for you to pass this exam.
AND-401: Android Application Development Exam
According to Android ATC the questions in this exam are based upon the content of “Android Application Development”. Please visit this link to see the outline of the course: AND-401 course outline
To become an Android certified app developer, and to obtain this certificate and the Android Certified Application Developer ID card, you must pass the Android application testing exam. You will receive the “Android Certified Application Developer Certificate” by mail within 4 weeks of passing the exam.
AND-402: Android Security Essentials Examination
Start preparing for the exam. Don’t let this be a race against time. The questions are based upon the content of the “Android Security Essentials” course. You can view the outline of the course at this link: AND-402 course outline.
AND-403: Monetize Android Apps
This exam is based on the content from “Monetize Android Applications”. This link will take you to the outline of the course: AND-403 course outline.
There are four Android exams, as it was stated previously. You can choose any one of them to take the first step towards success. If you work hard and pursue your goals, nothing can stop you passing an exam.

Project managers are tools crazy

I see a common theme among the emails and comments I receive and in forums where project managers are active.
You are asking a lot of questions about tools.
Project manager tools – By Svadilfari via Flickr
Tools, tools, tools.? MS Project. Primavera.? Wrike.? Basecamp.? There are many other tools, big and small. The “project manager tools” market is attracting a lot of attention and money. A company contacts me almost every week to ask me to review their new software that cuts, dices and makes julienne fries. However, you’ll notice that I don’t usually take up their offers.
I don’t think their products are bad. They are probably very good. Here’s the deal…
Project managers focus too much on tools
This is especially important for new project managers. You should stop trying to draw a network diagram on a piece of paper. Try it out for a small project. I can recommend the text, “Project Management-The Managerial Process”, which I learned it from. Particularly, Chapter 6.
Are Tools able to Manage Projects? You do.
Don’t get me wrong.? I love tools, too. They can be very useful and allow for analysis or rigor that would not otherwise be possible. It is quite common for me to make my own tools that I can customize to my projects. I believe in a solid up-front effort to continue to improve productivity.
This is possible because I took the time to learn the concepts and understood them first.
As I do in email and forums, I encourage those who are just starting in project management to get a better understanding of formal project management concepts.
You can then become a toolhead.

A project workflow is essential! Sara Sparrow, a pmStudent Contributor, shares the importance of project workflow. How much time do these questions take up?

  • Who does what in the project’s scope?
  • What are your expectations for the project?
  • What is the deadline?
  • What can the team take away from the project’s success?

These are important questions. A project workflow can help you quickly and easily find the answers. You can be more strategic by freeing up your time. A project workflow provides your team with a valuable roadmap. What is a Project Workflow? What is a project workflow? A workflow is a collection of tasks. Many workflows are integrated into businesses, companies, and organizations. Workflows are often used to automate certain business processes. Depending on the task or project, workflows can be used by one or more people. To make a workflow work, you need to remember the following goals:

  • Assign the right people to the correct jobs or positions.
  • Respect people’s wishes if they prefer a certain way of doing things.
  • Make sure that you consider outside influences such as vendors, third parties, and other contractors.
  • You must ensure that the right tools and equipment are used in your project.
  • When you start a project, make sure there is a process.

The Reasons You Need a Project Workflow. While it is easy to work without a project flow, it can make things easier for you and your team. Imagine your team is having a problem during production. What would you do? Project workflows provide structure and order. If something happens that is beyond anyone’s control, you can still rely on your workflow. A workflow can be your safety net in case of an emergency. Check out these great benefits of using a project flow: Improving Project Management First, a workflow helps you to define each step in the production phase. A workflow can help you and your team know what, when, and how to do it. This will give you structure and help you manage your project. Cost- and Time-Estimate Accuracy Project teams worry about the cost of a project as well as how long it will take. Your project team could fall behind in production if the cost and time estimates don’t match up or you may have to start over. Project workflows are a way to ensure order and structure during the production phase. A workflow can help you and your team estimate how much a project will cost and how long it will take. Operations made more efficient A project workflow makes it easier to run operations. Operations that are efficient can create and deliver deliverables on time and without any problems. This is possible when you allow workflows to serve as your roadmap. A workflow is a guideline that defines and executes operations. The workflow can also help you identify inefficiencies and suggest alternative ways to solve them. This will allow you to streamline tasks and roles, and ensure that team members know what to do. Avoid Risks. No project is perfect. There will be risks for your team. This is why project workflows are necessary. It allows you to easily identify potential risks within your project. A workflow can help you not only spot potential risks but also prevent them from happening again. Types of Project Workflows You might think there is only one type. There are many types of project workflows. Here are two examples of project workflows: Process Workflows. Process workflows are designed for defining the scope of the project.

You Could Be Looking at Milestones All Wrong (with John Carter and TCGen).

John Carter, founder of TCGen, explains how milestones can be used in project management to empower people, drive product market fit and build trust.
Similar Links:
Join the Digital Project Managers Association
Subscribe to our newsletter for the latest articles and podcasts
Check out TCGen
Connect with John via Linkedin
Follow John on Twitter
Similar articles and podcasts
About the podcast
How to use milestones in project Management to keep your projects on track
Article explaining the 4 agile scrum processes.
How to become a digital manager.
Podcast about building and scaling project management groups
Article about creating workflows that consider the preferences of your team
This article will show you how to conduct a sprint planning session like an executive.
This article explains 3 key similarities between agile, lean and lean methodologies.
What is Mind Mapping? (+ How to do it & Best Tools)
We are currently trying to transcribe our podcasts using a software program. We are sorry for any typos. The bot doesn’t always do what is expected.
Audio Transcription:
Galen Low
Now you are staring at your project plan again, dreading the milestones that you helped to create. They seem to be closer and closer as you look at them. They seem so innocent at first glance. They were lines in sand that you could use for planning in larger strokes. They are now a burden on your neck, immovable deadlines that cannot be argued with. They are the murmurs, doubts, and threats to make you a target for angry stakeholders on your day of death. If this sounds familiar, it’s because you may be one of those PMs who has been incorrectly using project milestones. We are all in this boat together, so rest assured. If you want your project milestones less burdensome and more of an incentive to stakeholder collaboration, keep listening.
Galen Low
We appreciate you tuning in. Galen Low is the Digital Project manager. We are a group digital professionals who want each other to become more skilled, confident, connect, and deliver better projects. If you want to hear more about that, head over to thedigitalprojectmanager.com.
Galen Low
All right. All right. My guest today is a respected expert in product development and familiar with project management. He is responsible for Bose’s noise-cancelling headphones and Apple’s development process for new products. His company, TCGen, advises major brands like Apple, Cisco, and Hewlett-Packard. He recently hired a tutor for music theory and is now composing music. Please, Mr. John Carter. Hello, John.
John Carter
Hello Galen. Glad to be here.
Galen Low
It was great to have your on the program. It was a pleasure. John, thank you so much for your CV. It was incredible. This article is about product innovation at Bose and Apple, as well as running your own business and writing books. So I thought I would ask you what you want to do as a teen.
John Carter
That’s a great question. It’s something that I do in my spare hours. My goal is to be an engineer. I have always wanted the ability to design things, make calculations, predict performance, and make predictions. This is what has always motivated and inspired me. Still drives me.
Galen Low
That’s amazing! It was an inspiration to me to do more innovation. Engineering is a mindset that allows you to come up with new ideas that are practical, feasible, and that people will actually use.
John Carter
Although it wasn’t very thoughtful at the beginning, I was the typical boy scientist. So I was the ch